Sciweavers

2181 search results - page 314 / 437
» The restriction scaffold problem
Sort
View
ACISP
2004
Springer
14 years 2 months ago
Convertible Nominative Signatures
Abstract. A feasible solution to prevent potential misuse of signatures is to put some restrictions on their verification. Therefore S.J.Kim, S.J.Park and D.H.Won introduced the n...
Zhenjie Huang, Yumin Wang
APPROX
2004
Springer
100views Algorithms» more  APPROX 2004»
14 years 2 months ago
Estimating the Distance to a Monotone Function
In standard property testing, the task is to distinguish between objects that have a property P and those that are ε-far from P, for some ε > 0. In this setting, it is perfec...
Nir Ailon, Bernard Chazelle, Seshadhri Comandur, D...
APWEB
2004
Springer
14 years 2 months ago
Generalized Inclusion Dependencies in XML
Abstract. Integrity constraints play a fundamental role in defining semantics in both conventional databases and in XML documents. In this paper we generalize previous approaches ...
Millist W. Vincent, Michael Schrefl, Jixue Liu, Ch...
ESORICS
2004
Springer
14 years 2 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
HIPC
2004
Springer
14 years 2 months ago
A-FAST: Autonomous Flow Approach to Scheduling Tasks
Abstract. This paper investigates the problem of autonomously allocating a large number of independent, equal sized tasks on a distributed heterogeneous grid-like platform, using o...
Sagnik Nandy, Larry Carter, Jeanne Ferrante