Sciweavers

2028 search results - page 9 / 406
» Deriving Relation Keys from XML Keys
Sort
View
SIGMOD
2002
ACM
196views Database» more  SIGMOD 2002»
15 years 11 months ago
Storing and querying ordered XML using a relational database system
XML is quickly becoming the de facto standard for data exchange over the Internet. This is creating a new set of data management requirements involving XML, such as the need to st...
Igor Tatarinov, Stratis Viglas, Kevin S. Beyer, Ja...
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
14 years 9 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
FGR
2006
IEEE
102views Biometrics» more  FGR 2006»
15 years 5 months ago
Robust Spotting of Key Gestures from Whole Body Motion Sequence
Robust gesture recognition in video requires segmentation of the meaningful gestures from a whole body gesture sequence. This is a challenging problem because it is not straightfo...
Hee-Deok Yang, A-Yeon Park, Seong-Whan Lee
ISMIR
2004
Springer
115views Music» more  ISMIR 2004»
15 years 5 months ago
Musical key extraction from audio
The realisation and evaluation of a musical key extraction algorithm that works directly on raw audio data is presented. Its implementation is based on models of human auditory pe...
Steffen Pauws
91
Voted
SRDS
1993
IEEE
15 years 3 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen