Sciweavers

281 search results - page 37 / 57
» Toward Practical Constraint Databases
Sort
View
CCR
2010
131views more  CCR 2010»
13 years 8 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Hierarchical Spatio-Temporal Context Modeling for Action Recognition
The problem of recognizing actions in realistic videos is challenging yet absorbing owing to its great potentials in many practical applications. Most previous research is limit...
Jintao Li, Ju Sun, Loong Fah Cheong, Shuicheng Yan...
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 9 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 9 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...
ICDE
1997
IEEE
136views Database» more  ICDE 1997»
14 years 9 months ago
Delegation: Efficiently Rewriting History
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delega...
Cris Pedregal Martin, Krithi Ramamritham