Sciweavers

2089 search results - page 266 / 418
» Finding Environment Guarantees
Sort
View
ICDE
1997
IEEE
166views Database» more  ICDE 1997»
16 years 5 months ago
Multiple View Consistency for Data Warehousing
A data warehouse stores integrated information from multiple distributed data sources. In effect, the warehouse stores materialized views over the source data. The problem of ensu...
Yue Zhuge, Hector Garcia-Molina, Janet L. Wiener
WWW
2005
ACM
16 years 5 months ago
Static approximation of dynamically generated Web pages
Server-side programming is one of the key technologies that support today's WWW environment. It makes it possible to generate Web pages dynamically according to a user's...
Yasuhiko Minamide
136
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 5 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
CADE
2008
Springer
16 years 4 months ago
Certifying a Tree Automata Completion Checker
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping...
Benoît Boyer, Thomas Genet, Thomas P. Jensen
CADE
2008
Springer
16 years 4 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen