Sciweavers

1042 search results - page 203 / 209
» Towards Requirements Engineering of Active Database Systems
Sort
View
158
Voted
CCS
2010
ACM
15 years 15 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
SEMWEB
2007
Springer
15 years 10 months ago
OLA in the OAEI 2007 Evaluation Contest
Abstract. Similarity has become a classical tool for ontology confrontation motivated by alignment, mapping or merging purposes. In the definition of an ontologybased measure one ...
Jean François Djoufak Kengue, Jér&oc...
129
Voted
ER
2007
Springer
129views Database» more  ER 2007»
15 years 10 months ago
A Methodology and Toolkit for Deploying Contract Documents as E-contracts
Recent research in e-contracts is concerned with the development of frameworks and tools to support contracts. EREC framework is one that enables modelling and deployment of e-con...
Anushree Khandekar, P. Radha Krishna, Kamalakar Ka...
138
Voted
EDBT
2009
ACM
134views Database» more  EDBT 2009»
15 years 7 months ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
DAC
2007
ACM
16 years 4 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt