Sciweavers

2715 search results - page 151 / 543
» Database Publication Practices
Sort
View
PERCOM
2010
ACM
13 years 6 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 11 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
TSMC
2008
237views more  TSMC 2008»
13 years 8 months ago
The CAS-PEAL Large-Scale Chinese Face Database and Baseline Evaluations
In this paper, we describe the acquisition and contents of a large-scale Chinese face database: CAS-PEAL face database. The goals of creating the CAS-PEAL face database include 1) ...
Wen Gao, Bo Cao, Shiguang Shan, Xilin Chen, Delong...
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
14 years 23 days ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 8 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng