Sciweavers

680 search results - page 109 / 136
» Implementing database operations using SIMD instructions
Sort
View
PET
2009
Springer
14 years 3 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
DEXAW
2006
IEEE
95views Database» more  DEXAW 2006»
14 years 2 months ago
Optimising Performance in Network-Based Information Systems: Virtual Organisations and Customised Views
Network-based information systems use well-defined standards to ensure interoperability and also have a tightly coupled relationship between their internal data representation an...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
14 years 16 days ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
EDBT
2012
ACM
214views Database» more  EDBT 2012»
11 years 11 months ago
An optimization framework for map-reduce queries
We present an effective optimization framework for general SQLlike map-reduce queries, which is based on a novel query algebra and uses a small number of higher-order physical ope...
Leonidas Fegaras, Chengkai Li, Upa Gupta
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
14 years 2 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...