Sciweavers

880 search results - page 162 / 176
» Looking at data
Sort
View
CCS
2005
ACM
14 years 3 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
ICISS
2005
Springer
14 years 3 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
14 years 3 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
SIGCOMM
2004
ACM
14 years 3 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
RT
2004
Springer
14 years 3 months ago
PointWorks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments
ks: Abstraction and Rendering of Sparsely Scanned Outdoor Environments Hui Xu, Nathan Gossett and Baoquan Chen University of Minnesota Digital Technology Center at Twin Cities † ...
Hui Xu, Nathan Gossett, Baoquan Chen