Sciweavers

258 search results - page 20 / 52
» Find a Meeting
Sort
View
GVD
2009
125views Database» more  GVD 2009»
14 years 9 months ago
A quantum logic-based query processing approach for extending relational query languages
Evaluating a traditional database query against a data tuple returns a true on match and a false on mismatch. Unfortunately, there are many application scenarios where such an eva...
Sebastian Lehrack
IEEEIAS
2009
IEEE
14 years 9 months ago
A Study on the Algorithm Based on Image Color Correlation Mining
: Because of the semantic gap between low-level feature and high-level semantic feature of images, the results of the traditional color-based image retrieval can't meet users&...
Yongyue Chen, Huosong Xia
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 9 months ago
A Framework for Constraint-Based Deployment and Autonomic Management of Distributed Applications
We propose a framework for deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative ...
Alan Dearle, Graham N. C. Kirby, Andrew McCarthy
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 10 days ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
USS
2008
15 years 2 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...