Sciweavers

10038 search results - page 1818 / 2008
» Model Checking for Managers
Sort
View
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CIKM
1999
Springer
15 years 8 months ago
Mining Inter-Transaction Associations with Templates
Multi-dimensional, inter-transaction association rules extend the traditional association rules to describe more general associations among items with multiple properties cross tr...
Ling Feng, Hongjun Lu, Jeffrey Xu Yu, Jiawei Han
CIKM
1999
Springer
15 years 8 months ago
A Comparison of Alternative Continuous Display Techniques with Heterogeneous Multi-Zone Disks
A number of recent technological trends have made data intensive applications such as continuous media audio and video servers a reality. These servers are expected to play an i...
Shahram Ghandeharizadeh, Seon Ho Kim
CIKM
1999
Springer
15 years 8 months ago
A Unified Environment for Fusion of Information Retrieval Approaches
Prior work has shown that combining results of various retrieval approaches and query representations can improve search effectiveness. Today, many meta-search engines exist which...
M. Catherine McCabe, Abdur Chowdhury, David A. Gro...
DAWAK
1999
Springer
15 years 8 months ago
Dynamic Data Warehouse Design
A data warehouse DW can be seen as a set of materialized views de ned over remote base relations. When a query is posed, it is evaluated locally, using the materialized views, wi...
Dimitri Theodoratos, Timos K. Sellis
« Prev « First page 1818 / 2008 Last » Next »