Conferences related to Distributed databases

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2005 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2006 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2007 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2008 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics,motion analysis and physics-based vision.

  • 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics, motion analysis and physics-based vision.

  • 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Sensors Early and Biologically-Biologically-inspired Vision, Color and Texture, Segmentation and Grouping, Computational Photography and Video

  • 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Topics of interest include all aspects of computer vision and pattern recognition including motion and tracking,stereo, object recognition, object detection, color detection plus many more

  • 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. Main conference plus 50 workshop only attendees and approximately 50 exhibitors and volunteers.

  • 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    computer, vision, pattern, cvpr, machine, learning

  • 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conferenceand 27co-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students,academics and industry.

  • 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and severalco-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students, academics and industry researchers.


2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

The aim of IEEE ITAIC 2019 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. It provides opportunities for the delegates to exchange new ideas and application experiences, to establish business or research relations and to find global partners for future collaboration.

  • 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

    The aim objective of ITAIC 2011 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

  • 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)

    The aim objective of ITAIC 2014 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information Technology and Artificial Intelligence. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.


2019 Winter Simulation Conference (WSC)

WSC is the premier international forum for disseminating recent advances in the field of system simulation. In addition to a technical program of unsurpassed scope and quality, WSC provides the central meeting for practitioners, researchers, and vendors.



Periodicals related to Distributed databases

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Architecture Letters

Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing



Most published Xplore authors for Distributed databases

Back to Top

No authors for "Distributed databases"


Xplore Articles related to Distributed databases

Back to Top

Cooperating Mobile Agents

Mobile Agents in Networking and Distributed Computing, None

None


Adaptive Detection of Range-Distributed Targets Based on SAR Raw Data

7th European Conference on Synthetic Aperture Radar, 2008

Conventionally, Synthetic Aperture Radar (SAR) Automatic Target Detection and Recognition (ATD/R) are often performed in SAR image domain. A novel scheme of SAR target detection in the state of non-imaging is presented. More precisely, this paper addresses adaptive detection of SAR possibly range-distributed targets based on range-compressed but azimuth-uncompressed SAR raw data, rather than on the processed SAR image. The ...


Back cover

Journal of Communications and Networks, 2018

None


Site autonomy in a distributed database environment

Digest of Papers. COMPCON Spring 88 Thirty-Third IEEE Computer Society International Conference, 1988

The issue of site autonomy in the model of a decentralized distributed database system is discussed. The two major characteristics of site autonomy are identified and examined, and examples are provided to demonstrate their significance. A system architecture is proposed that provides a flexible and powerful way of achieving the required degree of site autonomy.<<ETX>>


SECURITY OF IoT DATA

Internet of Things and Data Analytics Handbook, None

This chapter describes security concerns associated with the devices, the network, and the data associated with Internet of Things (IoT) technologies and then addresses data security within IoT platforms built using Hadoop technologies. To manage the security and integrity of data, security admins create security policies to define which data each user is authorized to access using one or more ...



Educational Resources on Distributed databases

Back to Top

IEEE-USA E-Books

  • Cooperating Mobile Agents

    None

  • Adaptive Detection of Range-Distributed Targets Based on SAR Raw Data

    Conventionally, Synthetic Aperture Radar (SAR) Automatic Target Detection and Recognition (ATD/R) are often performed in SAR image domain. A novel scheme of SAR target detection in the state of non-imaging is presented. More precisely, this paper addresses adaptive detection of SAR possibly range-distributed targets based on range-compressed but azimuth-uncompressed SAR raw data, rather than on the processed SAR image. The SAR target detection is established in the context of space-time adaptive processing (STAP) and the spatial-temporal steering vector of an airborne stripmap SAR is first derived by exploiting signature diversity, namely of the fact that SAR can change the transmitted signal as the azimuth varies. The adaptive modified generalized likelihood ratio test (AMGLRT) proposed by A.De Maio is employed to detect range-distributed target from SAR raw data. Application of the AMGLRT to the recorded live SAR clutter raw data collected by an X band airborne high resolution SAR shows the feasibility of this novel detection scheme in possible realistic SAR scenarios.

  • Back cover

    None

  • Site autonomy in a distributed database environment

    The issue of site autonomy in the model of a decentralized distributed database system is discussed. The two major characteristics of site autonomy are identified and examined, and examples are provided to demonstrate their significance. A system architecture is proposed that provides a flexible and powerful way of achieving the required degree of site autonomy.<<ETX>>

  • SECURITY OF IoT DATA

    This chapter describes security concerns associated with the devices, the network, and the data associated with Internet of Things (IoT) technologies and then addresses data security within IoT platforms built using Hadoop technologies. To manage the security and integrity of data, security admins create security policies to define which data each user is authorized to access using one or more rules. The internet is best understood as a globally distributed network of voluntarily interconnected devices that can communicate with each other over well‐defined protocols to enable business operations. Based on the type of intercommunication, different protocols have organically emerged: data distribution service (DDS) protocol, message queue telemetry transport (MQTT) and extensible messaging and presence protocol (XMPP) and advanced message queuing protocol (AMQP). There are other protocols that address how devices communicate over wireless connections that include radio frequency identification (RFID), Wi‐Fi, or bluetooth technologies.

  • Looking Towards 4G: LTE‐Advanced

    The baseline LTE radio access network (RAN) and evolved packet core (EPC) network were defined in 3GPP Release 8, which was functionally frozen in December 2008. This chapter summarizes important additions to the LTE specifications. These include the most significant changes to the 3GPP standard, which occurred in Release 10 for the support of LTE‐Advanced, 3GPP's submission to the international telecommunications union radiocommunication sector (ITU‐R) international mobile telecommunications (IMT)‐advanced‐Advanced (4G) program. Release 10 developed the 3GPP proposal for the ITU‐R Sector IMT‐Advanced program. It is worth pointing out that both of the approved IMT‐Advanced technologies are based heavily on pre‐existing standards and the modifications that were required of these technologies to meet IMT‐Advanced requirements are not considered major, in particular for LTE Release 8, which already met most of the IMT‐Advanced requirements.

  • Resource Management: Performance Assuredness in Distributed Cloud Computing via Online Reconfigurations

    Cloud computing relies on software for distributed batch and stream processing, as well as distributed storage. This chapter focuses on an oft‐ignored angle of assuredness: performance assuredness. A significant pain point today is the inability to support reconfiguration operations, such as changing of the shard key in a sharded storage/database system, or scaling up (or down) of the number of virtual machines (VMs) being used in a stream or batch processing system. We discuss new techniques to support such reconfiguration operations in an online manner, whereby the system does not need to be shut down and the user/client‐perceived behavior is indistinguishable regardless of whether a reconfiguration is occurring in the background, that is, the performance continues to be assured in spite of ongoing background reconfiguration. Next, we describe how to scale‐out and scale‐in (increase or decrease) the number of machines/VMs in cloud computing frameworks like distributed stream processing and distributed graph processing systems, again while offering assured performance to the customer in spite of the reconfigurations occurring in the background. The ultimate performance assuredness is the ability to support SLAs/SLOs (service‐level agreements/objectives) such as deadlines. We present a new real‐time scheduler that supports priorities and hard deadlines for Hadoop jobs. We implemented our reconfiguration systems as patches to several popular and open‐source cloud computing systems, including MongoDB and Cassandra (storage), Storm (stream processing), LFGraph (graph processing), and Hadoop (batch processing).

  • BFC: High performance distributed big file cloud storage based on key value store

    Now-a-days cloud storage services are growing rapidly and becoming an emerging trend in data storage field. But in cloud not store the petabytes of data. In this reason develop new technology i.e. Big Data and Big File Cloud (BFC) Architecture. By using the Big Data technology store the petabytes of the data in cloud storage engines. But there is a many issues in designing efficient storage of engine for the cloud based system with the requirements. In Big Data using Key Value technique, Key value has dominant role in solving the problems. The main objective is to develop a simple and efficient BFC architecture. By using this easy process the big files up to petabytes, distribute the files, parallel process the I/O files, remove the redundant data, and reduce the file size by using data compression techniques.

  • SARA, a web based remote sensing digital library

    None

  • Introduction of the Content ID Forum (cIDf)

    To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established in Japan and began to construct a framework for contents distribution promotion while protecting copyrights. This document overviews the cIDf specifications and its activities.