Sciweavers

EDBTW
2010
Springer
15 years 8 months ago
An architecture for ad-hoc and collaborative business intelligence
The success of organizations or business networks depends on fast and well-founded decisions taken by the relevant people in their specific area of responsibility. To enable time...
Henrike Berthold, Philipp Rösch, Stefan Z&oum...
EDBT
2010
ACM
123views Database» more  EDBT 2010»
15 years 8 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish
107
Voted
ASMTA
2009
Springer
75views Mathematics» more  ASMTA 2009»
15 years 8 months ago
Moments Characterization of Order 3 Matrix Exponential Distributions
András Horváth, Sándor R&aacu...
154
Voted
DEBS
2010
ACM
15 years 8 months ago
An event view model and DSL for engineering an event-based SOA monitoring infrastructure
An event-based solution that uses events to convey information to a monitoring tool is well suited to implementing a non-intrusive monitoring infrastructure. This enables an SOA s...
Emmanuel Mulo, Uwe Zdun, Schahram Dustdar
ASIACRYPT
2009
Springer
15 years 8 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...