Sciweavers

403 search results - page 80 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
DOCENG
2006
ACM
14 years 3 days ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
ASIACRYPT
2003
Springer
13 years 9 months ago
Universal Designated-Verifier Signatures
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a `Universal Designated-Verifier Signatur...
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef...
VLDB
2005
ACM
185views Database» more  VLDB 2005»
14 years 6 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou
SIGMOD
2009
ACM
192views Database» more  SIGMOD 2009»
14 years 6 months ago
A gauss function based approach for unbalanced ontology matching
Ontology matching, aiming to obtain semantic correspondences between two ontologies, has played a key role in data exchange, data integration and metadata management. Among numero...
Qian Zhong, Hanyu Li, Juanzi Li, Guo Tong Xie, Jie...
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 6 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...