Sciweavers

2978 search results - page 61 / 596
» Operations Research
Sort
View
XMLSEC
2003
ACM
15 years 5 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
INTEGRATION
2007
100views more  INTEGRATION 2007»
14 years 11 months ago
A fast pipelined multi-mode DES architecture operating in IP representation
The Data Encryption Standard (DES) is a cipher that is still used in a broad range of applications, from smartcards, where it is often implemented as a tamperresistant embedded co...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
SAC
2010
ACM
15 years 6 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 5 months ago
Merging the Results of Approximate Match Operations
Data Cleaning is an important process that has been at the center of research interest in recent years. An important end goal of effective data cleaning is to identify the relatio...
Sudipto Guha, Nick Koudas, Amit Marathe, Divesh Sr...
WIAS
2008
128views more  WIAS 2008»
14 years 11 months ago
Considering operational issues for multiagent conceptual inferencing in a distributed information retrieval application
Our system, based on a multiagent framework called collaborative understanding of distributed knowledge (CUDK), is designed with the overall goal of balancing agents' conceptu...
Leen-Kiat Soh