Sciweavers

276 search results - page 17 / 56
» Generalized XML security views
Sort
View
IMC
2006
ACM
14 years 1 months ago
Comprehensive view of a live network coding P2P system
In this paper we present the first implementation of a P2P content distribution system that uses Network Coding. Using results from live trials with several hundred nodes, we pro...
Christos Gkantsidis, John Miller, Pablo Rodriguez
ER
2004
Springer
92views Database» more  ER 2004»
14 years 26 days ago
XBiT: An XML-Based Bitemporal Data Model
Abstract. Past research work on modeling and managing temporal information has, so far, failed to elicit support in commercial database systems. The increasing popularity of XML o...
Fusheng Wang, Carlo Zaniolo
MIR
2003
ACM
119views Multimedia» more  MIR 2003»
14 years 22 days ago
A wireless handheld multi-modal digital video library client system
We developed technologies for transmitting video contents over wireless platforms, and encapsulated these video delivery and presentation technologies into a client system for acc...
Michael R. Lyu, Jerome Yen, Edward Yau, Sam K. S. ...
PODS
2011
ACM
163views Database» more  PODS 2011»
12 years 10 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig