Sciweavers

1830 search results - page 26 / 366
» Implementing a Tamper-Evident Database System
Sort
View
PVLDB
2010
342views more  PVLDB 2010»
13 years 6 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
IJDAR
2002
98views more  IJDAR 2002»
13 years 7 months ago
An unconstrained handwriting recognition system
Abstract. In this paper, an integrated offline recognition system for unconstrained handwriting is presented. The proposed system consists of seven main modules: skew angle estimat...
Ergina Kavallieratou, Nikos Fakotakis, George K. K...
IDEAS
2007
IEEE
99views Database» more  IDEAS 2007»
14 years 1 months ago
Implementing Physical Hyperlinks for Mobile Applications Using RFID Tags
Hyperlinks are a well understood and widely used concept in many applications. Particularly the Web has promoted the concept of “clickable” links to users. Typically, hyperlin...
Joachim Schwieren, Gottfried Vossen
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
EDBT
2009
ACM
165views Database» more  EDBT 2009»
13 years 5 months ago
Exploiting the power of relational databases for efficient stream processing
Stream applications gained significant popularity over the last years that lead to the development of specialized stream engines. These systems are designed from scratch with a di...
Erietta Liarou, Romulo Goncalves, Stratos Idreos