Sciweavers

2309 search results - page 436 / 462
» Using Meta-Structures in Database Design
Sort
View
EDBT
2009
ACM
156views Database» more  EDBT 2009»
14 years 16 hour ago
Evaluating very large datalog queries on social networks
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Royi Ronen, Oded Shmueli
HPDC
1997
IEEE
13 years 11 months ago
A Secure Communications Infrastructure for High-Performance Distributed Computing
We describe a software infrastructure designed to support the development of applications that use high-speed networks to connect geographically distributed supercomputers, databa...
Ian T. Foster, Nicholas T. Karonis, Carl Kesselman...
MEDIAFORENSICS
2010
13 years 8 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
WEBNET
2000
13 years 8 months ago
New Approaches to Law Education: Making the Case for Web-based Learning
: Web-based instruction and online learning are changing customary practices in education. As conventional patterns for content delivery are influenced by new and improving technol...
Jennifer Gramling, Tom Galligan, Jean A. Derco
AGIS
2008
319views more  AGIS 2008»
13 years 7 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu