Sciweavers

1693 search results - page 226 / 339
» Interference-Resilient Information Exchange
Sort
View
DEXA
2005
Springer
93views Database» more  DEXA 2005»
15 years 10 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer
HIPC
2005
Springer
15 years 10 months ago
The Potential of On-Chip Multiprocessing for QCD Machines
We explore the opportunities offered by current and forthcoming VLSI technologies to on-chip multiprocessing for Quantum Chromo Dynamics (QCD), a computational grand challenge for ...
Gianfranco Bilardi, Andrea Pietracaprina, Geppino ...
ICCS
2005
Springer
15 years 10 months ago
PATM: Priority-Based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks
Abstract. We propose a distributed and adaptive topology management algorithm, called PATM (Priority-based Adaptive Topology Management), that constructs and maintains a connected ...
Haixia Tan, Weilin Zeng, Lichun Bao
ICISS
2005
Springer
15 years 10 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
ISCIS
2005
Springer
15 years 10 months ago
A Unified Approach to Survivability of Connection-Oriented Networks
This paper deals with problems of computer networks survivability. We present and discuss survivability aspects of Content Delivery Networks (CDNs) and other services based on the ...
Krzysztof Walkowiak