Sciweavers

367 search results - page 36 / 74
» Implementing P3P Using Database Technology
Sort
View
GIS
2009
ACM
14 years 9 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
BTW
2003
Springer
109views Database» more  BTW 2003»
14 years 1 months ago
Transbase: a Leading-edge ROLAP Engine Supporting Multidimensional Indexing and Hierarchy Clustering
: Analysis-oriented database applications, such as data warehousing or customer relationship management, play a crucial role in the database area. In general, the multidimensional ...
Roland Pieringer, Klaus Elhardt, Frank Ramsak, Vol...
OTM
2005
Springer
14 years 2 months ago
Optimization of Distributed Queries in Grid Via Caching
Abstract. Caching can highly improve performance of query processing in distributed databases. In this paper we show how this technique can be used in grid architecture where data ...
Piotr Cybula, Hanna Kozankiewicz, Krzysztof Stence...
WWW
2003
ACM
14 years 9 months ago
Ontology-Based Image Retrieval
The binary form of an image does not tell what the image is about. It is possible to retrieve images from a database using pattern matching techniques, but usually textual descript...
Avril Styrman, Eero Hyvönen, Kim Viljanen, Sa...
ERSA
2003
147views Hardware» more  ERSA 2003»
13 years 10 months ago
Towards Run-Time Re-Configurable Techniques for Real-Time Embedded Applications
Many embedded applications can benefit from the flexible custom computing opportunities that FPGA technology offers. The Run-Time Reconfiguration (RTR) of the FPGA as an applicati...
Timothy F. Oliver, Douglas L. Maskell