Sciweavers

13734 search results - page 2636 / 2747
» Abstractions of data types
Sort
View
126
Voted
MADNES
2005
Springer
15 years 10 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
SPAA
2004
ACM
15 years 10 months ago
Fighting against two adversaries: page migration in dynamic networks
Page migration is one of the fundamental subproblems in the framework of data management in networks. It occurs in a distributed network of processors sharing one indivisible memo...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...
150
Voted
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
15 years 10 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
15 years 10 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
DSMML
2004
Springer
15 years 10 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
« Prev « First page 2636 / 2747 Last » Next »