Sciweavers

4445 search results - page 731 / 889
» Reflective Authorization Systems
Sort
View
136
Voted
ISCAS
1999
IEEE
116views Hardware» more  ISCAS 1999»
15 years 9 months ago
A coefficient segmentation algorithm for low power implementation of FIR filters
The authors present a multiplication algorithm for low power implementation of digital filters on CMOS based digital signal processing systems. The algorithm decomposes individual...
Ahmet T. Erdogan, Tughrul Arslan
136
Voted
ISMIS
1999
Springer
15 years 9 months ago
A Statistical Approach to Rule Selection in Semantic Query Optimisation
Semantic Query Optimisation makes use of the semantic knowledge of a database (rules) to perform query transformation. Rules are normally learned from former queries fired by the u...
Barry G. T. Lowden, Jerome Robinson
ICDCS
1998
IEEE
15 years 9 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 9 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
PODS
1998
ACM
86views Database» more  PODS 1998»
15 years 9 months ago
Efficient Searching with Linear Constraints
An extended abstract of this paper appeared in Proceedings of the 15th ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems [1]. 2 E-mail: pankaÄcs.duke.edu; httpÂ...
Pankaj K. Agarwal, Lars Arge, Jeff Erickson, Paolo...