Sciweavers

1017 search results - page 108 / 204
» A General Model for Authenticated Data Structures
Sort
View
FSTTCS
2004
Springer
14 years 2 months ago
Symbolic Reachability Analysis of Higher-Order Context-Free Processes
We consider the problem of symbolic reachability analysis of higher-order context-free processes. These models are generalizations of the context-free processes (also called BPA pr...
Ahmed Bouajjani, Antoine Meyer
SIGMOD
2011
ACM
219views Database» more  SIGMOD 2011»
12 years 11 months ago
Context-sensitive ranking for document retrieval
We study the problem of context-sensitive ranking for document retrieval, where a context is defined as a sub-collection of documents, and is specified by queries provided by do...
Liang Jeff Chen, Yannis Papakonstantinou
GIS
2007
ACM
14 years 10 months ago
Multi-scale dual morse complexes for representing terrain morphology
We propose a new multi-scale terrain model, based on a hierarchical representation for the morphology of a terrain. The basis of our morphological model is a dual Morse decomposit...
Emanuele Danovaro, Leila De Floriani, Maria Vitali...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
WWW
2006
ACM
14 years 9 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli