Sciweavers

487 search results - page 85 / 98
» A New Approach to Cutting into Finite Element Models
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EUROCOLT
1995
Springer
13 years 11 months ago
The structure of intrinsic complexity of learning
Limiting identification of r.e. indexes for r.e. languages (from a presentation of elements of the language) and limiting identification of programs for computable functions (fr...
Sanjay Jain, Arun Sharma
CORR
2011
Springer
160views Education» more  CORR 2011»
13 years 2 months ago
Provenance for Aggregate Queries
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggr...
Yael Amsterdamer, Daniel Deutch, Val Tannen
EKAW
2008
Springer
13 years 9 months ago
E-Business Vocabularies as a Moving Target: Quantifying the Conceptual Dynamics in Domains
Most practically relevant domains include some degree of conceptual dynamics, i.e. new conceptual elements arise, and some old ones become irrelevant. This type of change imposes a...
Martin Hepp
BMCBI
2007
167views more  BMCBI 2007»
13 years 7 months ago
AlzPharm: integration of neurodegeneration data using RDF
Background: Neuroscientists often need to access a wide range of data sets distributed over the Internet. These data sets, however, are typically neither integrated nor interopera...
Hugo Y. K. Lam, Luis N. Marenco, Tim Clark, Yong G...