Sciweavers

2949 search results - page 571 / 590
» Transformations in Information Supply
Sort
View
BTW
2003
Springer
118views Database» more  BTW 2003»
14 years 24 days ago
Skalierbare Verarbeitung von XML mit Infonyte-DB
Abstract: The emerging penetration of IT architectures with XML leads to increasing XML data volumes. Available tools often fail in realizing scalable XML processing for large XML ...
Thomas Tesch, Peter Fankhauser, Tim Weitzel
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 24 days ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
ESOP
2003
Springer
14 years 24 days ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
FCCM
2002
IEEE
126views VLSI» more  FCCM 2002»
14 years 16 days ago
Hyperspectral Image Compression on Reconfigurable Platforms
NASA’s satellites currently do not make use of advanced image compression techniques during data transmission to earth because of limitations in the available platforms. With th...
Thomas W. Fry, Scott Hauck
SIGECOM
2010
ACM
164views ECommerce» more  SIGECOM 2010»
14 years 11 days ago
Truthful mechanisms with implicit payment computation
It is widely believed that computing payments needed to induce truthful bidding is somehow harder than simply computing the allocation. We show that the opposite is true for singl...
Moshe Babaioff, Robert D. Kleinberg, Aleksandrs Sl...