Sciweavers

1457 search results - page 208 / 292
» Privacy Challenges for Database Systems
Sort
View
152
Voted
EUROSYS
2006
ACM
15 years 11 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...

Publication
217views
17 years 2 months ago
Towards Efficient Search on Unstructured Data: An Intelligent-Storage Approach
Applications that create and consume unstructured data have grown both in scale of storage requirements and complexity of search primitives. We consider two such applications: exha...
Aravindan Raghuveer, Biplob K. Debnath, David Hung...
CVPR
2010
IEEE
15 years 11 months ago
Exploring Features in a Bayesian Framework for Material Recognition
We are interested in identifying the material category, e.g. glass, metal, fabric, plastic or wood, from a single image of a surface. Unlike other visual recognition tasks in comp...
Ce Liu, Lavanya Sharan, Edward Adelson, Ruth Rosen...
SCAM
2007
IEEE
15 years 8 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
CBMS
2001
IEEE
15 years 6 months ago
Automated Medical Citation Records Creation for Web-Based On-Line Journals
With the rapid expansion and utilization of the Internet and Web technologies, there is an increasing number of on-line medical journals. On-line journals pose new challenges in t...
Daniel X. Le, Loc Q. Tran, Joseph Chow, Jongwoo Ki...