Sciweavers

5386 search results - page 1043 / 1078
» Approaches to Multimedia and Security
Sort
View
JUCS
2010
130views more  JUCS 2010»
14 years 4 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
14 years 20 days ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 8 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
ESWS
2009
Springer
15 years 2 months ago
KiWi - A Platform for Semantic Social Software (Demonstration)
Abstract. Semantic Wikis have demonstrated the power of combining Wikis with Semantic Web technology. The KiWi system goes beyond Semantic Wikis by providing a flexible and adapta...
Sebastian Schaffert, Julia Eder, Szaby Grünwa...
GIS
2005
ACM
15 years 11 months ago
Contraflow network reconfiguration for evacuation planning: a summary of results
Contraflow, or lane reversal, is a way of increasing outbound capacity of a real network by reversing the direction of inbound roads during evacuations. The contraflow is consider...
Sangho Kim, Shashi Shekhar
« Prev « First page 1043 / 1078 Last » Next »