Sciweavers

464 search results - page 73 / 93
» Identity Management
Sort
View
EDBT
2009
ACM
85views Database» more  EDBT 2009»
14 years 8 days ago
Expressive, yet tractable XML keys
Constraints are important for a variety of XML recommendations and applications. Consequently, there are numerous opportunities for advancing the treatment of XML semantics. In pa...
Sven Hartmann, Sebastian Link
DOOD
1989
Springer
146views Database» more  DOOD 1989»
13 years 11 months ago
The Object-Oriented Database System Manifesto
This paper attempts to de ne an object-oriented database system. It describes the main features and characteristics that a system must have to qualify as an objectoriented databas...
Malcolm P. Atkinson, François Bancilhon, Da...
IDA
2010
Springer
13 years 11 months ago
Statistical Modelling for Data from Experiments with Short Hairpin RNAs
This paper delivers an example of applying intelligent data analysis to biological data where the success of the project was only possible due to joint efforts of the experts from ...
Frank Klawonn, Torsten Wüstefeld, Lars Zender
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 11 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
DAWAK
2006
Springer
13 years 11 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal