Sciweavers

1403 search results - page 148 / 281
» Security Model for XML Data
Sort
View
ER
2007
Springer
127views Database» more  ER 2007»
14 years 4 months ago
Generic Schema Mappings
Schema mappings come in different flavors: simple correspondences are produced by schema matchers, intensional mappings are used for schema integration. However, the execution of ...
David Kensche, Christoph Quix, Yong Li, Matthias J...
DAC
2005
ACM
14 years 11 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
14 years 3 days ago
On Mapping Business Document Models to Core Components
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
ISTA
2004
13 years 11 months ago
TransM: A Structured Document Transformation Model
: We present in this paper a transformation model for structured documents. TransM is a new model that deals with specified documents, where the structure conforms to a predefined ...
Nouhad Amaneddine, Jean Paul Bahsoun, Jean-Paul Bo...
ISMIR
2000
Springer
157views Music» more  ISMIR 2000»
14 years 1 months ago
Using User Models in Music Information Retrieval Systems
To make multimedia data easily retrieved, we use metadata to describe the information, so that search engines or other information filter tools can effectively and efficiently loc...
Wei Chai, Barry Vercoe