Sciweavers

199 search results - page 16 / 40
» Can Intuition Become Rigorous
Sort
View
DEBU
2010
134views more  DEBU 2010»
13 years 6 months ago
Causality in Databases
Provenance is often used to validate data, by verifying its origin and explaining its derivation. When searching for "causes" of tuples in the query results or in genera...
Alexandra Meliou, Wolfgang Gatterbauer, Joseph Y. ...
SEMWEB
2010
Springer
13 years 3 months ago
Accessing the Web of Data through embodied virtual characters
The amount of data published on the Semantic Web has witnessed a tremendous growth in the last years to which the Linked Open Data (LOD) project has contributed significantly. Whil...
Philipp Cimiano, Stefan Kopp
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
14 years 9 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
ALGOSENSORS
2009
Springer
14 years 3 months ago
Link Reversal: How to Play Better to Work Less
Sensor networks, with their ad hoc deployments, node mobility, and wireless communication, pose serious challenges for developing provably correct and efficient applications. A po...
Bernadette Charron-Bost, Jennifer L. Welch, Josef ...
WS
2006
ACM
14 years 2 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla