Sciweavers

344 search results - page 45 / 69
» Adaptive indexing for relational keys
Sort
View
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 5 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
14 years 5 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
COCOON
2007
Springer
14 years 5 months ago
Priority Algorithms for the Subset-Sum Problem
Greedy algorithms are simple, but their relative power is not well understood. The priority framework [5] captures a key notion of “greediness” in the sense that it processes (...
Yuli Ye, Allan Borodin
ATAL
2003
Springer
14 years 4 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh
COMPSAC
2002
IEEE
14 years 4 months ago
Requirements Driven Quality Control
The paper aims at presenting a method of controlling software quality attributes driven by the set of requirements. This is done in three steps: specifying all the requirements, ma...
Stanislaw Szejko