Sciweavers

1457 search results - page 208 / 292
» Privacy Challenges for Database Systems
Sort
View
EUROSYS
2006
ACM
14 years 7 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...

Publication
217views
15 years 10 months ago
Towards Efficient Search on Unstructured Data: An Intelligent-Storage Approach
Applications that create and consume unstructured data have grown both in scale of storage requirements and complexity of search primitives. We consider two such applications: exha...
Aravindan Raghuveer, Biplob K. Debnath, David Hung...
CVPR
2010
IEEE
14 years 6 months ago
Exploring Features in a Bayesian Framework for Material Recognition
We are interested in identifying the material category, e.g. glass, metal, fabric, plastic or wood, from a single image of a surface. Unlike other visual recognition tasks in comp...
Ce Liu, Lavanya Sharan, Edward Adelson, Ruth Rosen...
SCAM
2007
IEEE
14 years 4 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
CBMS
2001
IEEE
14 years 1 months ago
Automated Medical Citation Records Creation for Web-Based On-Line Journals
With the rapid expansion and utilization of the Internet and Web technologies, there is an increasing number of on-line medical journals. On-line journals pose new challenges in t...
Daniel X. Le, Loc Q. Tran, Joseph Chow, Jongwoo Ki...