Sciweavers

3885 search results - page 668 / 777
» Transformations for Write-All-with-Collision Model
Sort
View
CAISE
2003
Springer
14 years 3 months ago
Towards the Automation of Data Warehouse Logical Design: a Rule-Based Approach
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
CCS
2003
ACM
14 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
ICWE
2003
Springer
14 years 3 months ago
Hera: Development of Semantic Web Information Systems
Abstract. As a consequence of the success of the Web, methodologies for information system development need to consider systems that use the Web paradigm. These Web Information Sys...
Geert-Jan Houben, Peter Barna, Flavius Frasincar, ...
IEAAIE
2003
Springer
14 years 3 months ago
Fast Feature Selection by Means of Projections
The attribute selection techniques for supervised learning, used in the preprocessing phase to emphasize the most relevant attributes, allow making models of classification simple...
Roberto Ruiz, José Cristóbal Riquelm...