Sciweavers

3305 search results - page 144 / 661
» Can we Rely on SQL
Sort
View
COMPSAC
2009
IEEE
14 years 5 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
ICICS
2009
Springer
14 years 4 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
GPC
2010
Springer
14 years 4 months ago
Distributed Island-Based Query Answering for Expressive Ontologies
Scalability of reasoning systems is one of the main criteria which will determine the success of Semantic Web systems in the future. The focus of recent work is either on (a) expre...
Sebastian Wandelt, Ralf Möller
IAT
2008
IEEE
14 years 4 months ago
Exploiting Hyponymy in Extracting Relations and Enhancing Ontologies
Relation extraction systems typically rely on local lexical and syntactic features as evidence. Recent work suggests that for a given relation, there might exist certain patterns ...
Bhushan Mandhani, Stephen Soderland
IWSOS
2007
Springer
14 years 4 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...