Sciweavers

766 search results - page 84 / 154
» How to Read a Signature
Sort
View
ICDE
2001
IEEE
206views Database» more  ICDE 2001»
14 years 10 months ago
Cache-Aware Query Routing in a Cluster of Databases
We investigate query routing techniques in a cluster of databases for a query-dominant environment. The objective is to decrease query response time. Each component of the cluster...
Uwe Röhm, Klemens Böhm, Hans-Jörg S...
ACSAC
2000
IEEE
14 years 1 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
EUROCRYPT
1998
Springer
14 years 1 months ago
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption
We introduce a new cryptosystem with trapdoor decryption based on the di culty of computing discrete logarithms in the class group of the non-maximal imaginary quadratic order O q ...
Detlef Hühnlein, Michael J. Jacobson Jr., Sac...
ECOOP
2006
Springer
14 years 17 days ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
AAAI
2010
13 years 10 months ago
Community-Guided Learning: Exploiting Mobile Sensor Users to Model Human Behavior
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...