Sciweavers

2028 search results - page 41 / 406
» Deriving Relation Keys from XML Keys
Sort
View
148
Voted
DCC
2007
IEEE
16 years 3 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
132
Voted
IJSN
2006
116views more  IJSN 2006»
15 years 3 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
140
Voted
DOLAP
2008
ACM
15 years 5 months ago
Data mining-based fragmentation of XML data warehouses
With the multiplication of XML data sources, many XML data warehouse models have been proposed to handle data heterogeneity and complexity in a way relational data warehouses fail...
Hadj Mahboubi, Jérôme Darmont
140
Voted
ICDE
1993
IEEE
118views Database» more  ICDE 1993»
15 years 7 months ago
Entity Identification in Database Integration
The objective of entity identification is to determine the correspondence between object instances from more than one database. This paper ezamines the problem at the instance lev...
Ee-Peng Lim, Jaideep Srivastava, Satya Prabhakar, ...
131
Voted
MP
2008
126views more  MP 2008»
15 years 3 months ago
Geometry of interpolation sets in derivative free optimization
We consider derivative free methods based on sampling approaches for nonlinear optimization problems where derivatives of the objective function are not available and cannot be dir...
Andrew R. Conn, Katya Scheinberg, Luís N. V...