Sciweavers

2028 search results - page 13 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CORR
2010
Springer
181views Education» more  CORR 2010»
14 years 10 months ago
Mapping XML Data to Relational Data: A DOM-Based Approach
XML has emerged as the standard for representing and exchanging data on the World Wide Web. It is critical to have efficient mechanisms to store and query XML data to exploit the...
Mustafa Atay, Yezhou Sun, Dapeng Liu, Shiyong Lu, ...
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 3 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
ICWS
2008
IEEE
15 years 1 months ago
High-Performance XML Parsing and Validation with Permutation Phrase Grammar Parsers
The extensibility, flexibility, expressiveness, and platform-neutrality of XML delivers key advantages for interoperability. The interoperability of XML Web services often comes a...
Wei Zhang, Robert A. van Engelen
JDCTA
2010
171views more  JDCTA 2010»
14 years 6 months ago
A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database
To manage the complicated data such as recursive elements, multiply namespaces, repeatable structures, extended elements and attributes in the XML Binding documents of distance ed...
Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao
AMC
2005
121views more  AMC 2005»
14 years 11 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao