Sciweavers

1675 search results - page 202 / 335
» The Value of a Good Name
Sort
View
DOOD
1995
Springer
128views Database» more  DOOD 1995»
14 years 14 days ago
Authorization Analysis of Queries in Object-Oriented Databases
Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorization...
Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
MDM
2010
Springer
194views Communications» more  MDM 2010»
13 years 11 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare
ESA
2008
Springer
134views Algorithms» more  ESA 2008»
13 years 10 months ago
Improved Randomized Results for That Interval Selection Problem
Online interval selection is a problem in which intervals arrive one by one, sorted by their left endpoints. Each interval has a length and a non-negative weight associated with i...
Leah Epstein, Asaf Levin
LREC
2010
119views Education» more  LREC 2010»
13 years 10 months ago
Predicting Morphological Types of Chinese Bi-Character Words by Machine Learning Approaches
This paper presented an overview of Chinese bi-character words' morphological types, and proposed a set of features for machine learning approaches to predict these types bas...
Ting-Hao Huang, Lun-Wei Ku, Hsin-Hsi Chen