Sciweavers

8249 search results - page 188 / 1650
» The DBO database system
Sort
View
149
Voted
PRL
2007
180views more  PRL 2007»
15 years 3 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
145
Voted
ICDM
2010
IEEE
99views Data Mining» more  ICDM 2010»
15 years 1 months ago
A System for Mining Temporal Physiological Data Streams for Advanced Prognostic Decision Support
We present a mining system that can predict the future health status of the patient using the temporal trajectories of health status of a set of similar patients. The main noveltie...
Jimeng Sun, Daby Sow, Jianying Hu, Shahram Ebadoll...
124
Voted
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
15 years 1 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
143
Voted
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 6 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
128
Voted
VLDB
2002
ACM
122views Database» more  VLDB 2002»
15 years 3 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski