Sciweavers

224 search results - page 20 / 45
» Isolated Proofs of Knowledge and Isolated Zero Knowledge
Sort
View
FCSC
2010
92views more  FCSC 2010»
13 years 6 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
PVLDB
2010
174views more  PVLDB 2010»
13 years 6 months ago
x-RDF-3X: Fast Querying, High Update Rates, and Consistency for RDF Databases
The RDF data model is gaining importance for applications in computational biology, knowledge sharing, and social communities. Recent work on RDF engines has focused on scalable p...
Thomas Neumann, Gerhard Weikum
AAAI
1993
13 years 9 months ago
On the Adequateness of the Connection Method
Roughly speaking, adequatness is the property of a theorem proving method to solve simpler problems faster than more difficult ones. Automated inferencing methods are often not ad...
Antje Beringer, Steffen Hölldobler
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 2 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
ARC
2007
Springer
152views Hardware» more  ARC 2007»
13 years 7 months ago
Statistical signal processing approaches to fault detection
: The parity space approach to fault detection and isolation (FDI) has been developed during the last twenty years, and the focus here is to describe its application to stochastic ...
Fredrik Gustafsson