Sciweavers

1729 search results - page 202 / 346
» Deterministic Expressions in C
Sort
View
ICDT
2005
ACM
117views Database» more  ICDT 2005»
14 years 3 months ago
Privacy in Database Publishing
We formulate and study a privacy guarantee to data owners, who share information with clients by publishing views of a proprietary database. The owner identifies the sensitive pro...
Alin Deutsch, Yannis Papakonstantinou
ICMI
2005
Springer
126views Biometrics» more  ICMI 2005»
14 years 3 months ago
Synthetic characters as multichannel interfaces
  Synthetic characters are an effective modality to convey messages  to  the  user,  provide  visual  feedback  about  the  system  internal  understanding of...
Elena Not, Koray Balci, Fabio Pianesi, Massimo Zan...
WRAC
2005
Springer
14 years 3 months ago
Characterizing Environmental Information for Monitoring Agents
A multiagent architecture for vehicle and structural health monitoring is proposed. A prototype using this architecture was developed using JADE. Critical aspects of the design wer...
Albert C. Esterline, Bhanu Gandluri, Mannur Sundar...
DOCENG
2004
ACM
14 years 3 months ago
Logic-based XPath optimization
XPath [16] was introduced by the W3C as a standard language for specifying node selection, matching conditions, and for computing values from an XML document. XPath is now used in...
Pierre Genevès, Jean-Yves Vion-Dury
ESOP
2004
Springer
14 years 3 months ago
Compositional Analysis of Authentication Protocols
ESOP 2004, LNCS 2986, pages 140–154, 2004. c Springer–Verlag, Berlin Heildelberg 2003. We propose a new method for the static analysis of entity authentication protocols. We d...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei