Sciweavers

6153 search results - page 151 / 1231
» Modeling Cyclic Change
Sort
View
ICDE
2009
IEEE
205views Database» more  ICDE 2009»
15 years 15 days ago
Top-k Exploration of Query Candidates for Efficient Keyword Search on Graph-Shaped (RDF) Data
Keyword queries enjoy widespread usage as they represent an intuitive way of specifying information needs. Recently, answering keyword queries on graph-structured data has emerged ...
Thanh Tran, Haofen Wang, Sebastian Rudolph, Philip...
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
ILP
2005
Springer
14 years 4 months ago
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops
Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never s...
Yi-Dong Shen, Qiang Yang
ER
2007
Springer
109views Database» more  ER 2007»
14 years 2 months ago
Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains
The Selfish-brain theory has created the theoretical basis for the systemic analysis of the energy metabolism in terms of a supply chain. The energy in form of glucose equivalents...
Dirk Langemann
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro