Sciweavers

2114 search results - page 283 / 423
» Performance Evaluation on a Real-Time Database
Sort
View
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 10 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
ER
2007
Springer
85views Database» more  ER 2007»
15 years 10 months ago
A Taxonomy of Customer Relationship Management Analyses for Data Warehousing
Customer Relationship Management (CRM) is a strategy that supports an organization’s decision-making process to retain long-term and profitable relationships with its customers....
Colleen Cunningham, Il-Yeol Song
DSN
2006
IEEE
15 years 10 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
SRDS
2006
IEEE
15 years 10 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...
CRV
2005
IEEE
132views Robotics» more  CRV 2005»
15 years 10 months ago
Face Recognition with Weighted Locally Linear Embedding
We present an approach to recognizing faces with varying appearances which also considers the relative probability of occurrence for each appearance. We propose and demonstrate ex...
Nathan Mekuz, Christian Bauckhage, John K. Tsotsos