Sciweavers

6308 search results - page 1163 / 1262
» Modeling Urgency in Timed Systems
Sort
View
154
Voted
ERCIMDL
2006
Springer
161views Education» more  ERCIMDL 2006»
15 years 7 months ago
Scalable Semantic Overlay Generation for P2P-Based Digital Libraries
The advent of digital libraries along with the tremendous growth of digital content call for distributed and scalable approaches for managing vast data collections. Peer-to-peer (P...
Christos Doulkeridis, Kjetil Nørvåg, ...
ETRICS
2006
15 years 7 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 7 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
ACSAC
2001
IEEE
15 years 7 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
146
Voted
WEBDB
2000
Springer
136views Database» more  WEBDB 2000»
15 years 7 months ago
An Optimization Technique for Answering Regular Path Queries
Rewriting queries using views is a powerful technique that has applications in data integration, data warehousing and query optimization. Query rewriting in relational databases i...
Gösta Grahne, Alex Thomo
« Prev « First page 1163 / 1262 Last » Next »