Sciweavers

1830 search results - page 165 / 366
» Implementing a Tamper-Evident Database System
Sort
View
IDEAS
2007
IEEE
135views Database» more  IDEAS 2007»
14 years 5 months ago
Bitmap Index Design Choices and Their Performance Implications
Historically, bitmap indexing has provided an important database capability to accelerate queries. However, only a few database systems have implemented these indexes because of t...
Elizabeth J. O'Neil, Patrick E. O'Neil, Kesheng Wu
SIGMOD
2005
ACM
220views Database» more  SIGMOD 2005»
14 years 11 months ago
Sampling Algorithms in a Stream Operator
Complex queries over high speed data streams often need to rely on approximations to keep up with their input. The research community has developed a rich literature on approximat...
Theodore Johnson, S. Muthukrishnan, Irina Rozenbau...
ICRA
2008
IEEE
130views Robotics» more  ICRA 2008»
14 years 5 months ago
A natural gesture interface for operating robotic systems
Abstract— A gesture-based interaction framework is presented for controlling mobile robots. This natural interaction paradigm has few physical requirements, and thus can be deplo...
Anqi Xu, Gregory Dudek, Junaed Sattar
ICT
2004
Springer
143views Communications» more  ICT 2004»
14 years 4 months ago
A Generic Event-Driven System for Managing SNMP-Enabled Communication Networks
In the area of monitoring communication networks, GEDSystem is a tool for supporting the development of programs driven to the management of domains that may show up when networks ...
Aécio Paiva Braga, Riverson Rios, Rossana M...
HPCN
1999
Springer
14 years 3 months ago
A Flexible Security System for Metacomputing Environments
Abstract. A metacomputing environment is a collection of geographically distributed resources (people, computers, devices, databases) connected by one or more high-speed networks, ...
Adam Ferrari, Frederick Knabe, Marty Humphrey, Ste...