Sciweavers

1235 search results - page 240 / 247
» Updating a cracked database
Sort
View
CVPR
2006
IEEE
14 years 9 months ago
Image Matching Using Photometric Information
Image matching is an essential task in many computer vision applications. It is obvious that thorough utilization of all available information is critical for the success of match...
Michael Kolomenkin, Ilan Shimshoni
GIS
2007
ACM
14 years 8 months ago
Location anonymity in continuous location-based services
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. ...
Toby Xu, Ying Cai
WWW
2005
ACM
14 years 8 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
IUI
2010
ACM
14 years 4 months ago
An adaptive calendar assistant using pattern mining for user preference modelling
In this paper, we present SmartCal, a calendar assistant that suggests appointment attributes, such as time, day, duration, etc., given any combination of initial user input attri...
Alfred Krzywicki, Wayne Wobcke, Anna Wong