Sciweavers

761 search results - page 92 / 153
» Concise and Consistent Naming
Sort
View
CIKM
2004
Springer
14 years 1 months ago
InfoAnalyzer: a computer-aided tool for building enterprise taxonomies
In this paper we study the problem of collecting training samples for building enterprise taxonomies. We develop a computer-aided tool named InfoAnalyzer, which can effectively as...
Li Zhang, Shixia Liu, Yue Pan, Liping Yang
CLUSTER
2006
IEEE
14 years 1 months ago
Modeling Network Contention Effects on All-to-All Operations
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient complete exchange ...
Luiz Angelo Steffenel
EUROCRYPT
2006
Springer
14 years 1 months ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret
MABS
2000
Springer
14 years 1 months ago
Sexual Attraction and Inter-sexual Dominance among Virtual Agents
In many group-living primates, males are dominant over females, but despite this dominance, they allow females access to resources during the period when females are sexually attra...
Charlotte K. Hemelrijk
DOOD
1995
Springer
128views Database» more  DOOD 1995»
14 years 1 months ago
Authorization Analysis of Queries in Object-Oriented Databases
Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorization...
Hiroyuki Seki, Yasunori Ishihara, Minoru Ito