Sciweavers

2028 search results - page 388 / 406
» Deriving Relation Keys from XML Keys
Sort
View
131
Voted
ICALP
2005
Springer
15 years 9 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
130
Voted
ICCS
2005
Springer
15 years 9 months ago
Managing Heterogeneity in a Grid Parallel Haskell
Computational Grids potentially offer cheap large-scale high-performance systems, but are a very challenging architecture, being heterogeneous, shared and hierarchical. Rather tha...
Abdallah Al Zain, Philip W. Trinder, Hans-Wolfgang...
141
Voted
FASE
2004
Springer
15 years 9 months ago
Consistent Adaptation and Evolution of Class Diagrams during Refinement
Abstract. Software models are key in separating and solving independent development concerns. However, there is still a gap on how to transition design information among these sepa...
Alexander Egyed
126
Voted
IWCIA
2004
Springer
15 years 9 months ago
A Comparison of Property Estimators in Stereology and Digital Geometry
We consider selected geometric properties of 2D or 3D sets, given in form of binary digital pictures, and discuss their estimation. The properties examined are perimeter and area i...
Yuman Huang, Reinhard Klette
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 9 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...