Sciweavers

2237 search results - page 298 / 448
» Storing information with extractors
Sort
View
CIKM
2009
Springer
14 years 5 months ago
Transaction synchronization protocol using XML in client-server environment
The problem of transaction synchronization is important in XMLbased applications based on client-server model, especially when both server and clients are allowed to store data. W...
Noman Zahid, Muhammad Shahid Ansari, Kyung-Goo Doh
ER
2009
Springer
111views Database» more  ER 2009»
14 years 5 months ago
A New Point Access Method Based on Wavelet Trees
Abstract. The development of index structures that allow ecient retrieval of spatial objects has been a topic of interest in the last decades. Most of these structures have been d...
Nieves R. Brisaboa, Miguel Rodríguez Luaces...
IVIC
2009
Springer
14 years 5 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
PET
2009
Springer
14 years 5 months ago
Scalable Link-Based Relay Selection for Anonymous Routing
The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
Micah Sherr, Matt Blaze, Boon Thau Loo
PKDD
2009
Springer
124views Data Mining» more  PKDD 2009»
14 years 5 months ago
Capacity Control for Partially Ordered Feature Sets
Abstract. Partially ordered feature sets appear naturally in many classification settings with structured input instances, for example, when the data instances are graphs and a fe...
Ulrich Rückert