Sciweavers

5384 search results - page 991 / 1077
» Open Standards Requirements
Sort
View
82
Voted
IDEAS
2009
IEEE
192views Database» more  IDEAS 2009»
15 years 5 months ago
A cluster-based approach to XML similarity joins
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Leonardo Ribeiro, Theo Härder, Fernanda S. Pi...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 5 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
ASIACRYPT
2009
Springer
15 years 5 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
CIKM
2009
Springer
15 years 5 months ago
MKEM: a multi-level knowledge emergence model for mining undiscovered public knowledge
Background: Since Swanson proposed the Undiscovered Public Knowledge (UPK) model, there have been many approaches to uncover UPK by mining the biomedical literature. These earlier...
Ali Zeeshan Ijaz, Min Song, Doheon Lee
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 5 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder