Sciweavers

3318 search results - page 317 / 664
» The Weak Instance Model
Sort
View
142
Voted
ER
2000
Springer
151views Database» more  ER 2000»
15 years 8 months ago
Algebraic Database Migration to Object Technology
Relational database systems represent the current standard technology for implementing database applications. Now that the object-oriented paradigm becomes more and more mature in...
Andreas Behm, Andreas Geppert, Klaus R. Dittrich
168
Voted
EUROCRYPT
2000
Springer
15 years 8 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
149
Voted
EUROCOLT
1995
Springer
15 years 8 months ago
A decision-theoretic generalization of on-line learning and an application to boosting
k. The model we study can be interpreted as a broad, abstract extension of the well-studied on-line prediction model to a general decision-theoretic setting. We show that the multi...
Yoav Freund, Robert E. Schapire
EKAW
2008
Springer
15 years 6 months ago
E-Business Vocabularies as a Moving Target: Quantifying the Conceptual Dynamics in Domains
Most practically relevant domains include some degree of conceptual dynamics, i.e. new conceptual elements arise, and some old ones become irrelevant. This type of change imposes a...
Martin Hepp
DMIN
2007
85views Data Mining» more  DMIN 2007»
15 years 6 months ago
A Clustering Approach for Achieving Data Privacy
Abstract — New privacy regulations together with everincreasing data availability and computational power have created a huge interest in data privacy research. One major researc...
Alina Campan, Traian Marius Truta, John Miller, Ra...