Sciweavers

3256 search results - page 446 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
ICDE
2006
IEEE
208views Database» more  ICDE 2006»
15 years 11 months ago
Integrating Databases into the Semantic Web through an Ontology-Based Framework
To realize the Semantic Web, it will be necessary to make existing database content available for emerging Semantic Web applications, such as web agents and services, which use on...
Dejing Dou, Paea LePendu, Shiwoong Kim, Peishen Qi
IJNSEC
2008
166views more  IJNSEC 2008»
15 years 5 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
FAST
2008
15 years 7 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
MSWIM
2005
ACM
15 years 11 months ago
Sensor-assisted wi-fi indoor location system for adapting to environmental dynamics
Wi-Fi based indoor location systems have been shown to be both cost-effective and accurate, since they can attain meter-level positioning accuracy by using existing Wi-Fi infrastr...
Yi-Chao Chen, Ji-Rung Chiang, Hao-Hua Chu, Polly H...
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 7 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng