Sciweavers

181 search results - page 24 / 37
» A Mechanism for Verifying Data Speculation
Sort
View
IADIS
2003
15 years 1 months ago
Performance Analysis of DCF Access Schemes over IEEE 802.11A Physical Layer
IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802. It has specified a new physical layer (PHY) to support higher data rates, known as the orthogon...
S. Selvakennedy
PVLDB
2008
134views more  PVLDB 2008»
14 years 11 months ago
Reasoning and identifying relevant matches for XML keyword search
Keyword search is a user-friendly mechanism for retrieving XML data in web and scientific applications. An intuitively compelling but vaguely defined goal is to identify matches t...
Ziyang Liu, Yi Chen
CCS
2011
ACM
13 years 11 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
GECCO
2006
Springer
128views Optimization» more  GECCO 2006»
15 years 3 months ago
FTXI: fault tolerance XCS in integer
In the realm of data mining, several key issues exists in the traditional classification algorithms, such as low readability, large rule number, and low accuracy with information ...
Hong-Wei Chen, Ying-Ping Chen
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 1 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera