Sciweavers

2028 search results - page 24 / 406
» Deriving Relation Keys from XML Keys
Sort
View
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
15 years 12 months ago
Closing the key loophole in MLS databases
: There has been an abundance of research within the last couple of decades in the area of multilevel secure (MLS) databases. Recent work in this field deals with the processing of...
Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
ISMIR
2004
Springer
100views Music» more  ISMIR 2004»
15 years 5 months ago
Well-Tempered Spelling: A Key Invariant Pitch Spelling Algorithm
In this paper is described a data-driven algorithm for the functionally correct spelling of MIDI pitch values in terms of Western musical notation. Input is in the form of MIDI fi...
Josh Stoddard, Christopher Raphael, Paul E. Utgoff
77
Voted
SAFECOMP
2005
Springer
15 years 5 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
LANMR
2004
15 years 1 months ago
Some Key Notions in Non-monotonic Reasoning
This paper explores the role of some basic notions in the study of non-monotonic reasoning, such as validity, logical consequence, context, rules and assumptions.1 It offers some ...
Raymundo Morado
ENTCS
2006
145views more  ENTCS 2006»
14 years 11 months ago
Automated Derivation of Translators From Annotated Grammars
In this paper we propose a technique to automate the process of building translators between operations languages, a family of DSLs used to program satellite operations procedures...
Diego Ordóñez Camacho, Kim Mens, Mar...