Sciweavers

5924 search results - page 1137 / 1185
» Normal Process Representatives
Sort
View
CCS
2001
ACM
13 years 11 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
ICSE
2000
IEEE-ACM
13 years 11 months ago
Galileo: a tool built from mass-market applications
We present Galileo, an innovative engineering modeling and analysis tool built using an approach we call packageoriented programming (POP). Galileo represents an ongoing evaluatio...
David Coppit, Kevin J. Sullivan
ISMIR
2000
Springer
225views Music» more  ISMIR 2000»
13 years 11 months ago
Beyond VARIATIONS: Creating a Digital Music Library
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Jon W. Dunn
PADL
2000
Springer
13 years 11 months ago
Transformation-by-Example for XML
Abstract. xml is a language for describing markup languages for structured data. A growing number of applications that process xml documents are transformers, i.e., programs that c...
Shriram Krishnamurthi, Kathryn E. Gray, Paul T. Gr...
SIGIR
1995
ACM
13 years 11 months ago
Integrating IR and RDBMS Using Cooperative Indexing
The full integration of information retrieval (IR) features into a database management system (DBMS) has long been recognized as both a significant goal and a challenging undertak...
Samuel DeFazio, Amjad M. Daoud, Lisa Ann Smith, Ja...
« Prev « First page 1137 / 1185 Last » Next »