Sciweavers

651 search results - page 77 / 131
» Negative Database for Data Security
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 1 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
12 years 10 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
DEBS
2007
ACM
13 years 11 months ago
Temporal order optimizations of incremental joins for composite event detection
Queries for composite events typically involve the four complementary dimensions of event data, event composition, relationships between events (esp. temporal and causal), and acc...
François Bry, Michael Eckert
FGR
2006
IEEE
108views Biometrics» more  FGR 2006»
13 years 11 months ago
Regression and Classification Approaches to Eye Localization in Face Images
We address the task of accurately localizing the eyes in face images extracted by a face detector, an important problem to be solved because of the negative effect of poor localiz...
Mark Everingham, Andrew Zisserman