Sciweavers

349 search results - page 21 / 70
» Symmetrically exploiting XML
Sort
View
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 4 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
ICDT
2003
ACM
91views Database» more  ICDT 2003»
14 years 3 months ago
Reformulation of XML Queries and Constraints
We state and solve the query reformulation problem for XML publishing in a general setting that allows mixed (XML and relational) storage for the proprietary data and exploits redu...
Alin Deutsch, Val Tannen
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
14 years 3 months ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...
USS
2004
13 years 11 months ago
Graphical Dictionaries and the Memorable Space of Graphical Passwords
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force ...
Julie Thorpe, Paul C. van Oorschot
SIAMSC
2010
155views more  SIAMSC 2010»
13 years 4 months ago
Quasi-Newton Methods on Grassmannians and Multilinear Approximations of Tensors
In this paper we proposed quasi-Newton and limited memory quasi-Newton methods for objective functions defined on Grassmannians or a product of Grassmannians. Specifically we defin...
Berkant Savas, Lek-Heng Lim