Sciweavers

2028 search results - page 88 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 7 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
PEPM
2007
ACM
15 years 10 months ago
Bidirectional interpretation of XQuery
XQuery is a powerful functional language to query XML data. This paper presents a bidirectional interpretation of XQuery to address the problem of updating XML data through materi...
Dongxi Liu, Zhenjiang Hu, Masato Takeichi
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 9 months ago
The Importance of Process Knowledge for Cross Project Learning: Evidence from a UK Hospital
A core prescription from the knowledge management movement is that the successful management of organizational knowledge will prevent firms from “reinventing the wheel.” Infor...
Sue Newell, Harry Scarbrough, Jacky Swan, Maxine R...
KDD
1995
ACM
128views Data Mining» more  KDD 1995»
15 years 7 months ago
Discovery of Concurrent Data Models from Experimental Tables: A Rough Set Approach
The main objective of machine discovery is the determination of relations between data and of data models. In the paper we describe a method for discovery of data models represent...
Andrzej Skowron, Zbigniew Suraj