Sciweavers

7416 search results - page 1314 / 1484
» Design of an Anatomy Information System
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
14 years 8 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
PODS
2006
ACM
96views Database» more  PODS 2006»
14 years 8 months ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...
EDBT
2008
ACM
124views Database» more  EDBT 2008»
14 years 8 months ago
Scalable XQuery type matching
XML Schema awareness has been an integral part of the XQuery language since its early design stages. Matching XML data against XML types is the main operation that backs up XQuery...
Jens Teubner
MOBIHOC
2007
ACM
14 years 7 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
MOBIHOC
2006
ACM
14 years 7 months ago
Data storage placement in sensor networks
Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. This paper introduces stora...
Bo Sheng, Qun Li, Weizhen Mao
« Prev « First page 1314 / 1484 Last » Next »