Sciweavers

3885 search results - page 736 / 777
» Transformations for Write-All-with-Collision Model
Sort
View
HPDC
2000
IEEE
14 years 3 days ago
dQUOB: Managing Large Data Flows using Dynamic Embedded Queries
The dQUOB system satis es client need for speci c information from high-volume data streams. The data streams we speak of are the ow of data existing during large-scale visualizat...
Beth Plale, Karsten Schwan
AINA
2010
IEEE
14 years 1 days ago
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems
One of the major premises of P2P systems is to enable fully decentralized collaborative functionalities for supporting work teams and P2P communities. Within collaborative systems,...
Fatos Xhafa, Alex Poulovassilis
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 12 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
AMFG
2007
IEEE
238views Biometrics» more  AMFG 2007»
13 years 11 months ago
Towards Pose-Invariant 2D Face Classification for Surveillance
A key problem for "face in the crowd" recognition from existing surveillance cameras in public spaces (such as mass transit centres) is the issue of pose mismatches betwe...
Conrad Sanderson, Ting Shan, Brian C. Lovell
EUROCRYPT
2007
Springer
13 years 11 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas