Sciweavers

2577 search results - page 308 / 516
» Multimedia Question Answering
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
BPM
2005
Springer
113views Business» more  BPM 2005»
15 years 10 months ago
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models
Most information systems log events (e.g., transaction logs, audit trails) to audit and monitor the processes they support. At the same time, many of these processes have been expl...
Anne Rozinat, Wil M. P. van der Aalst
CONCUR
2005
Springer
15 years 10 months ago
Games Where You Can Play Optimally Without Any Memory
Abstract. Reactive systems are often modelled as two person antagonistic games where one player represents the system while his adversary represents the environment. Undoubtedly, t...
Hugo Gimbert, Wieslaw Zielonka
VLDB
2005
ACM
139views Database» more  VLDB 2005»
15 years 10 months ago
Tree-Pattern Queries on a Lightweight XML Processor
Popular XML languages, like XPath, use “treepattern” queries to select nodes based on their structural characteristics. While many processing methods have already been propose...
Mirella Moura Moro, Zografoula Vagena, Vassilis J....
WDAG
2005
Springer
118views Algorithms» more  WDAG 2005»
15 years 10 months ago
Distributed Computing with Imperfect Randomness
Randomness is a critical resource in many computational scenarios, enabling solutions where deterministic ones are elusive or even provably impossible. However, the randomized solu...
Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanatha...