Sciweavers

CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 8 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
CORR
2008
Springer
65views Education» more  CORR 2008»
13 years 8 months ago
An Introduction to Knowledge Management
Sabu M. Thampi
CORR
2008
Springer
73views Education» more  CORR 2008»
13 years 8 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 8 months ago
An evaluation of Bradfordizing effects
The purpose of this paper is to apply and evaluate the bibliometric method Bradfordizing for information retrieval (IR) experiments. Bradfordizing is used for generating core docu...
Philipp Mayr
CORR
2008
Springer
53views Education» more  CORR 2008»
13 years 8 months ago
Zigzag Persistence
Gunnar Carlsson, Vin de Silva
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 8 months ago
Stable normal forms for polynomial system solving
This paper describes and analyzes a method for computing border bases of a zero-dimensional ideal I. The criterion used in the computation involves specific commutation polynomial...
Bernard Mourrain, Philippe Trebuchet
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 8 months ago
Omnidirectional Relay in Wireless Networks
For wireless networks with multiple sources, an omnidirectional relay scheme is developed, where each node can help relay multiple messages in different directions. This is accomp...
Liang-Liang Xie
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 8 months ago
LACK - a VoIP Steganographic Method
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of net...
Wojciech Mazurczyk, Józef Lubacz
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 8 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...
CORR
2008
Springer
81views Education» more  CORR 2008»
13 years 8 months ago
Revisiting the Core Ontology and Problem in Requirements Engineering
In their seminal paper in the ACM Transactions on Software Engineering and Methodology, Zave and Jackson established a core ontology for Requirements Engineering (RE) and used it ...
Ivan Jureta, John Mylopoulos, Stéphane Faul...