Sciweavers

13822 search results - page 2754 / 2765
» Models in Knowledge Management
Sort
View
BMCBI
2004
131views more  BMCBI 2004»
13 years 8 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
DPD
1998
117views more  DPD 1998»
13 years 8 months ago
Solving Local Cost Estimation Problem for Global Query Optimization in Multidatabase Systems
To meet users’ growing needs for accessing pre-existing heterogeneous databases, a multidatabase system (MDBS) integrating multiple databases has attracted many researchers recen...
Qiang Zhu, Per-Åke Larson
CJ
1999
80views more  CJ 1999»
13 years 8 months ago
Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems
In a distributed real-time database system (DRTDBS), a commit protocol is required to ensure transaction failure atomicity. If data conflicts occur between executing and committin...
Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jian...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 8 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
« Prev « First page 2754 / 2765 Last » Next »