Sciweavers

1830 search results - page 120 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDAR
2009
IEEE
13 years 8 months ago
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition
This paper presents an off-line Arabic Handwriting recognition system based on the selection of different state of the art features and the combination of multiple Hidden Markov M...
Mahdi Hamdani, Haikal El Abed, Monji Kherallah, Ad...
SIGMOD
1993
ACM
77views Database» more  SIGMOD 1993»
14 years 2 months ago
The oo7 Benchmark
The OO7 Benchmark represents a comprehensive test of OODBMS performance. In this report we describe the benchmark and present performance results from its implementation in four O...
Michael J. Carey, David J. DeWitt, Jeffrey F. Naug...
SIGMOD
2010
ACM
188views Database» more  SIGMOD 2010»
14 years 3 months ago
A demonstration of FlexPref: extensible preference evaluation inside the DBMS engine
This demonstration presents FlexPref, a framework implemented inside the DBMS query processor that enables efficient and extensible preference query processing. FlexPref provides ...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
SOSP
2007
ACM
14 years 7 months ago
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
This paper describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares ...
Ben Vandiver, Hari Balakrishnan, Barbara Liskov, S...
CCS
2011
ACM
12 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg