Sciweavers

1663 search results - page 280 / 333
» Privacy and Identity Management
Sort
View
ICS
1999
Tsinghua U.
15 years 4 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
DOOD
1989
Springer
146views Database» more  DOOD 1989»
15 years 3 months ago
The Object-Oriented Database System Manifesto
This paper attempts to de ne an object-oriented database system. It describes the main features and characteristics that a system must have to qualify as an objectoriented databas...
Malcolm P. Atkinson, François Bancilhon, Da...
IDA
2010
Springer
15 years 3 months ago
Statistical Modelling for Data from Experiments with Short Hairpin RNAs
This paper delivers an example of applying intelligent data analysis to biological data where the success of the project was only possible due to joint efforts of the experts from ...
Frank Klawonn, Torsten Wüstefeld, Lars Zender
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 3 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
KDD
2000
ACM
121views Data Mining» more  KDD 2000»
15 years 3 months ago
Mining high-speed data streams
Many organizations today have more than very large databases; they have databases that grow without limit at a rate of several million records per day. Mining these continuous dat...
Pedro Domingos, Geoff Hulten