Sciweavers

18697 search results - page 3640 / 3740
» Systemic Security Management
Sort
View
ICDE
2009
IEEE
130views Database» more  ICDE 2009»
16 years 6 months ago
Recursive Computation of Regions and Connectivity in Networks
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
ICIP
2001
IEEE
16 years 6 months ago
Adaptive video background modeling using color and depth
Copyright 2001 IEEE. Published in the 2001 International Conference on Image Processing (ICIP-2001), October 7-10, 2001, Thessaloniki, Greece. Personal use of this material is per...
Gaile G. Gordon, John Woodfill, Michael Harville
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
16 years 5 months ago
Top-k Spatial Joins of Probabilistic Objects
Probabilistic data have recently become popular in applications such as scientific and geospatial databases. For images and other spatial datasets, probabilistic values can capture...
Vebjorn Ljosa, Ambuj K. Singh
ICDE
2006
IEEE
207views Database» more  ICDE 2006»
16 years 5 months ago
Automatic Sales Lead Generation from Web Data
Speed to market is critical to companies that are driven by sales in a competitive market. The earlier a potential customer can be approached in the decision making process of a p...
Ganesh Ramakrishnan, Sachindra Joshi, Sumit Negi, ...
ICDE
2005
IEEE
106views Database» more  ICDE 2005»
16 years 5 months ago
Effective Computation of Biased Quantiles over Data Streams
Skewis prevalentin manydata sourcessuchas IP traffic streams. To continually summarize the distribution of such data, a highbiased set of quantiles (e.g., 50th, 90th and 99th perc...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
« Prev « First page 3640 / 3740 Last » Next »