Sciweavers

9425 search results - page 1769 / 1885
» Some Notes on Models and Modelling
Sort
View
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 8 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
ESWS
2009
Springer
15 years 8 months ago
The Relevance of Reasoning and Alignment Incoherence in Ontology Matching
Abstract. Ontology matching has become an important field of research over the last years. Although many different approaches have been proposed, only few of them are committed t...
Christian Meilicke
ESWS
2009
Springer
15 years 8 months ago
ONKI SKOS Server for Publishing and Utilizing SKOS Vocabularies and Ontologies as Services
Vocabularies are the building blocks of the Semantic Web providing shared terminological resources for content indexing, information retrieval, data exchange, and content integrati...
Jouni Tuominen, Matias Frosterus, Kim Viljanen, Ee...
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 8 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 8 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
« Prev « First page 1769 / 1885 Last » Next »