Sciweavers

349 search results - page 33 / 70
» Transactional Computation: Overview and Discussion
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
NSPW
2003
ACM
15 years 2 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
PODS
1998
ACM
134views Database» more  PODS 1998»
15 years 1 months ago
A New Framework For Itemset Generation
The problem of finding association rules in a large database of sales transactions has been widely studied in the literature, We discuss some of the weaknessesof the large itemset...
Charu C. Aggarwal, Philip S. Yu
JUCS
2006
108views more  JUCS 2006»
14 years 9 months ago
Defining Atomic Composition in UML Behavioral Diagrams
Abstract: UML may be used to describe both the structure and behavior of objectoriented systems using a combination of notations. For the modeling of the dynamic behavior, a number...
Júlio Henrique Araújo Pereira Machad...
59
Voted
SOFSEM
2010
Springer
15 years 6 months ago
Clock Synchronization: Open Problems in Theory and Practice
Clock synchronization is one of the most basic building blocks for many applications in computer science and engineering. The purpose of clock synchronization is to provide the con...
Christoph Lenzen, Thomas Locher, Philipp Sommer, R...