Sciweavers

2028 search results - page 79 / 406
» Deriving Relation Keys from XML Keys
Sort
View
EDBT
2008
ACM
178views Database» more  EDBT 2008»
16 years 4 months ago
An inductive database and query language in the relational model
In the demonstration, we will present the concepts and an implementation of an inductive database ? as proposed by Imielinski and Mannila ? in the relational model. The goal is to...
Lothar Richter, Jörg Wicker, Kristina Kessler...
ISAAC
2005
Springer
97views Algorithms» more  ISAAC 2005»
15 years 9 months ago
A Min-Max Relation on Packing Feedback Vertex Sets
Let G be a graph with a nonnegative integral function w defined on V (G). A collection F of subsets of V (G) (repetition is allowed) is called a feedback vertex set packing in G ...
Xujin Chen, Guoli Ding, Xiaodong Hu, Wenan Zang
ISSA
2004
15 years 5 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
ISW
1997
Springer
15 years 8 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
15 years 7 months ago
A Canonical Scheme for Model Composition
There is little agreement on terminology in model composition, and even less on key characteristics of a model composition solution. We present three composition frameworks: the At...
Jean Bézivin, Salim Bouzitouna, Marcos Dido...