Sciweavers

1497 search results - page 175 / 300
» Constraint Databases: A Survey
Sort
View
92
Voted
IJNSEC
2006
143views more  IJNSEC 2006»
14 years 10 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
77
Voted
JODL
2006
136views more  JODL 2006»
14 years 10 months ago
An experimental effectiveness comparison of methods for 3D similarity search
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
IJWIS
2007
77views more  IJWIS 2007»
14 years 10 months ago
World's first web census
: Purpose — To measure the exact size of the World Wide Web (i.e., a census). The measure used is the number of publicly accessible web servers on port 80. Design/methodology/app...
Darcy G. Benoit, André Trudel
99
Voted
IS
1998
14 years 10 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
VLDB
2007
ACM
145views Database» more  VLDB 2007»
15 years 10 months ago
LCS-TRIM: Dynamic Programming Meets XML Indexing and Querying
In this article, we propose a new approach for querying and indexing a database of trees with specific applications to XML datasets. Our approach relies on representing both the q...
Shirish Tatikonda, Srinivasan Parthasarathy, Matth...