Sciweavers

2114 search results - page 225 / 423
» Performance Evaluation on a Real-Time Database
Sort
View
133
Voted
SDMW
2004
Springer
15 years 10 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
ICDE
2003
IEEE
137views Database» more  ICDE 2003»
15 years 10 months ago
Personalized Portals for the Wireless and Mobile User; a Mobile Agent Approach
The Wireless environment requires new type of services and new ways for structuring the needed content. Personalization comes into aid via the creation of personalized portals tha...
Christoforos Panayiotou, George Samaras
IPPS
2003
IEEE
15 years 10 months ago
Accurate Method for Fast Design of Diagnostic Oligonucleotide Probe Sets for DNA Microarrays
We present a method for the automatic generation of oligonucleotide probe sets for DNA microarrays. This approach is well suited particularly for specificity evaluation of design...
Andreas Krause, Markus Kräutner, Harald Meier
126
Voted
AVBPA
2001
Springer
114views Biometrics» more  AVBPA 2001»
15 years 9 months ago
Speaker Discriminative Weighting Method for VQ-Based Speaker Identification
: We consider the matching function in vector quantization based speaker identification system. The model of a speaker is a codebook generated from the set of feature vectors from ...
Tomi Kinnunen, Pasi Fränti
VLDB
1998
ACM
123views Database» more  VLDB 1998»
15 years 8 months ago
Diag-Join: An Opportunistic Join Algorithm for 1:N Relationships
Time of creation is one of the predominant (often implicit) clustering strategies found not only in Data Warehouse systems: line items are created together with their correspondin...
Sven Helmer, Till Westmann, Guido Moerkotte