Sciweavers

9272 search results - page 1604 / 1855
» Process Management Agent
Sort
View
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
CIKM
2005
Springer
15 years 10 months ago
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...
Erwin Leonardi, Sourav S. Bhowmick
CIKM
2005
Springer
15 years 10 months ago
Versatile structural disambiguation for semantic-aware applications
In this paper, we propose a versatile disambiguation approach which can be used to make explicit the meaning of structure based information such as XML schemas, XML document struc...
Federica Mandreoli, Riccardo Martoglia, Enrico Ron...
CIKM
2005
Springer
15 years 10 months ago
Selectivity-based partitioning: a divide-and-union paradigm for effective query optimization
Modern query optimizers select an efficient join ordering for a physical execution plan based essentially on the average join selectivity factors among the referenced tables. In ...
Neoklis Polyzotis
CLEF
2005
Springer
15 years 10 months ago
BulQA: Bulgarian-Bulgarian Question Answering at CLEF 2005
This paper describes the architecture of a Bulgarian–Bulgarian question answering system — BulQA. The system relies on a partially parsed corpus for answer extraction. The que...
Kiril Ivanov Simov, Petya Osenova
« Prev « First page 1604 / 1855 Last » Next »