Sciweavers

DBSEC
2007
151views Database» more  DBSEC 2007»
13 years 9 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
DBSEC
2007
116views Database» more  DBSEC 2007»
13 years 9 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
DBSEC
2007
80views Database» more  DBSEC 2007»
13 years 9 months ago
A Scalable and Secure Cryptographic Service
In this paper we present the design of a scalable and secure cryptographic service that can be adopted to support large-scale networked systems, which may require strong authentica...
Shouhuai Xu, Ravi S. Sandhu
DATESO
2007
107views Database» more  DATESO 2007»
13 years 9 months ago
Work with Knowledge on the Internet - Local Search
Authors are looking within their research grant new original web local search algorithm respecting specifics of Czech national environment. We would like to initiate further debate...
Antonin Pavlicek, Josef Muknsnabl
DATESO
2007
103views Database» more  DATESO 2007»
13 years 9 months ago
Using BMH Algorithm to Solve Subset of XPath Queries
Boyer-Moore-Horspool (BMH) algorithm is commonly used to solve text searching problems. In this paper is used to solve the constraint subset of XPath queries offering effective alg...
David Toth
DATESO
2007
113views Database» more  DATESO 2007»
13 years 9 months ago
Using XSEM for Modeling XML Interfaces of Services in SOA
In this paper we briefly describe a new conceptual model for XML data called XSEM and how to use it for modeling XML interfaces of services in service oriented architecture (SOA)....
Martin Necasky
DATESO
2007
107views Database» more  DATESO 2007»
13 years 9 months ago
Updating Typed XML Documents Using a Functional Data Model
We address a problem of updating XML documents having their XML schema described by a Document Type Definition (DTD) without breaking their validity. We present a way how to expre...
Pavel Loupal
DATESO
2007
100views Database» more  DATESO 2007»
13 years 9 months ago
Syllable-Based Burrows-Wheeler Transform
The Burrows-Wheeler Transform (BWT) is a compression method which reorders an input string into the form, which is preferable to another compression. Usually Move-To-Front transfor...
Jan Lansky, Katsiaryna Chernik, Zuzana Vlckova
DATESO
2007
134views Database» more  DATESO 2007»
13 years 9 months ago
Genetic Algorithms in Syllable-Based Text Compression
Abstract. Syllable based text compression is a new approach to compression by symbols. In this concept syllables are used as the compression symbols instead of the more common char...
Tomas Kuthan, Jan Lansky