Sciweavers

5722 search results - page 1096 / 1145
» Security Function Interactions
Sort
View
EDBT
2009
ACM
113views Database» more  EDBT 2009»
14 years 4 months ago
Supporting annotations on relations
Annotations play a key role in understanding and curating databases. Annotations may represent comments, descriptions, lineage information, among several others. Annotation manage...
Mohamed Y. Eltabakh, Walid G. Aref, Ahmed K. Elmag...
FOCS
2009
IEEE
14 years 4 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
ICPP
2009
IEEE
14 years 4 months ago
Using Standards-Based Interfaces to Share Data across Grid Infrastructures
—Data grids, such as the ones used by the high energy physics community, are used to share vast amounts of data across geographic locations. However, interactions with grid data ...
Karolina Sarnowska, Andrew S. Grimshaw, Erwin Laur...
ICSEA
2009
IEEE
14 years 4 months ago
Ontology Driven E-Government
: This paper presents an approach to model ontologies for the e-Government domain as a basis for an integrated e-Government environment. Over the last couple of years the applicati...
Peter Salhofer, Bernd Stadlhofer, Gerald Tretter
INFOCOM
2009
IEEE
14 years 4 months ago
Noncooperative Load Balancing in the Continuum Limit of a Dense Network
Abstract—In transportation network research, the main approach for predicting traffic distribution due to noncooperative vehicle choices has been through fluid type models. The...
Eitan Altman, Ishai Menache, Asuman E. Ozdaglar
« Prev « First page 1096 / 1145 Last » Next »