Sciweavers

2715 search results - page 181 / 543
» Database Publication Practices
Sort
View
TCOS
2010
13 years 3 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
SIGMOD
2004
ACM
108views Database» more  SIGMOD 2004»
14 years 8 months ago
Enabling Sovereign Information Sharing Using Web Services
Sovereign information sharing allows autonomous entities to compute queries across their databases in such a way that nothing apart from the result is revealed. We describe an imp...
Rakesh Agrawal, Dmitri Asonov, Ramakrishnan Srikan...
SAT
2005
Springer
111views Hardware» more  SAT 2005»
14 years 1 months ago
On Subsumption Removal and On-the-Fly CNF Simplification
Conjunctive Normal Form (CNF) Boolean formulas generated from resolution or solution enumeration often have much redundancy. It is desirable to have an efficient algorithm to simpl...
Lintao Zhang
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 3 days ago
Interactive query refinement
We investigate the problem of refining SQL queries to satisfy cardinality constraints on the query result. This has applications to the many/few answers problems often faced by da...
Chaitanya Mishra, Nick Koudas
EDBT
2010
ACM
122views Database» more  EDBT 2010»
14 years 3 months ago
Self-selecting, self-tuning, incrementally optimized indexes
: © Self-selecting, self-tuning, incrementally optimized indexes Goetz Graefe, Harumi Kuno HP Laboratories HPL-2010-24 database index, adaptive, autonomic, query execution In a re...
Goetz Graefe, Harumi A. Kuno