Sciweavers

464 search results - page 51 / 93
» Identity Management
Sort
View
ISVLSI
2003
IEEE
147views VLSI» more  ISVLSI 2003»
14 years 1 months ago
Automated Dynamic Memory Data Type Implementation Exploration and Optimization
The behavior of many algorithms is heavily determined by the input data. Furthermore, this often means that multiple and completely different execution paths can be followed, also...
Marc Leeman, Chantal Ykman-Couvreur, David Atienza...
SIGMOD
2004
ACM
150views Database» more  SIGMOD 2004»
14 years 7 months ago
Integrating Vertical and Horizontal Partitioning Into Automated Physical Database Design
In addition to indexes and materialized views, horizontal and vertical partitioning are important aspects of physical design in a relational database system that significantly imp...
Sanjay Agrawal, Vivek R. Narasayya, Beverly Yang
METRICS
1996
IEEE
13 years 12 months ago
Evaluating the Impact of Object-Oriented Design on Software Quality
This paper describes the results of a study where the impact of Object-Oriented design on software quality characteristics is experimentally evaluated. A suite of metrics for OO d...
Fernando Brito e Abreu, Walcélio L. Melo
IWSEC
2007
Springer
14 years 1 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
ISCI
2008
160views more  ISCI 2008»
13 years 7 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan