Sciweavers

19866 search results - page 3859 / 3974
» Computing all factorizations in ***
Sort
View
INFOCOM
1994
IEEE
15 years 1 months ago
Optimization of Wireless Resources for Personal Communications Mobility Tracking
In personal communications applications, users communicate via wireless with a wireline network. The wireline network tracks the current location of the user, and can therefore ro...
Upamanyu Madhow, Michael L. Honig, Kenneth Steigli...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
VLDB
1987
ACM
92views Database» more  VLDB 1987»
15 years 1 months ago
Mind Your Grammar: a New Approach to Modelling Text
Beginning to create the New Oxford English Dictionary database has resulted in the realization that databases for reference texts are unlike those for conventional enterprises. Wh...
Gaston H. Gonnet, Frank Wm. Tompa
CSFW
2010
IEEE
15 years 1 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
EDBT
2010
ACM
152views Database» more  EDBT 2010»
15 years 1 months ago
Feedback-based annotation, selection and refinement of schema mappings for dataspaces
The specification of schema mappings has proved to be time and resource consuming, and has been recognized as a critical bottleneck to the large scale deployment of data integrati...
Khalid Belhajjame, Norman W. Paton, Suzanne M. Emb...
« Prev « First page 3859 / 3974 Last » Next »