Sciweavers

1693 search results - page 45 / 339
» Interference-Resilient Information Exchange
Sort
View
VLDB
2007
ACM
108views Database» more  VLDB 2007»
15 years 10 months ago
Update Exchange with Mappings and Provenance
We consider systems for data sharing among heterogeneous peers related by a network of schema mappings. Each peer has a locally controlled and edited database instance, but wants ...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
15 years 4 months ago
"Pay-as-You-Go" Processing for Tracing Queries in a P2P Record Exchange System
In recent years, data provenance or lineage tracing which refers to the process of tracing the sources of data, data movement between databases, and annotations written for data ha...
Fengrong Li, Takuya Iida, Yoshiharu Ishikawa
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
15 years 3 months ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
PROVSEC
2007
Springer
15 years 4 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
AMEC
2004
Springer
15 years 3 months ago
Revenue Failures and Collusion in Combinatorial Auctions and Exchanges with VCG Payments
Abstract. In a combinatorial auction, there are multiple items for sale, and bidders are allowed to place a bid on a bundle of these items rather than just on the individual items....
Vincent Conitzer, Tuomas Sandholm