Sciweavers

4337 search results - page 683 / 868
» Cache-Oblivious Query Processing
Sort
View
ADT
2006
15 years 2 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
AEI
2006
253views more  AEI 2006»
15 years 2 months ago
Computer based pedestrian landscape design using decision tree templates
Machine Learning algorithms can act as a valuable analytical tool in design research. In this paper, we demonstrate the application of a decision tree learning algorithm for desig...
Baranidharan Raman, Jody R. Naderi
138
Voted
JCM
2008
138views more  JCM 2008»
15 years 2 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
111
Voted
JDWM
2008
97views more  JDWM 2008»
15 years 2 months ago
Seismological Data Warehousing and Mining: A Survey
Earthquake data composes an ever increasing collection of earth science information for post-processing analysis. Earth scientists, local or national administration officers and s...
Gerasimos Marketos, Yannis Theodoridis, Ioannis S....
CORR
2007
Springer
121views Education» more  CORR 2007»
15 years 2 months ago
Use of Wikipedia Categories in Entity Ranking
Wikipedia is a useful source of knowledge that has many applications in language processing and knowledge representation. The Wikipedia category graph can be compared with the clas...
James A. Thom, Jovan Pehcevski, Anne-Marie Vercous...