Sciweavers

651 search results - page 100 / 131
» Negative Database for Data Security
Sort
View
TPDS
1998
94views more  TPDS 1998»
14 years 11 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
OOPSLA
1989
Springer
15 years 3 months ago
Static Type Inference for Parametric Classes
Method inheritance and data abstraction are central features of objectoriented programming that are attained through a hierarchical organization of classes. Recent studies have sh...
Atsushi Ohori, Peter Buneman
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 2 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
JCS
2002
115views more  JCS 2002»
14 years 11 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
CVPR
2008
IEEE
16 years 1 months ago
Boosted deformable model for human body alignment
This paper studies image alignment, the problem of learning a shape and appearance model from labeled data and efficiently fitting the model to a non-rigid object with large varia...
Xiaoming Liu 0002, Ting Yu, Thomas Sebastian, Pete...