Sciweavers

8933 search results - page 100 / 1787
» Usability over time
Sort
View
SDMW
2005
Springer
15 years 11 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
INDOCRYPT
2001
Springer
15 years 9 months ago
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
We present an algorithm for generating elliptic curves of prime order over Optimal Extension Fields suitable for use in cryptography. The algorithm is based on the theory of Comple...
Harald Baier
ICGI
2010
Springer
15 years 6 months ago
Generalizing over Several Learning Settings
We recapitulate regular one-shot learning from membership and equivalence queries, positive and negative finite data. We present a meta-algorithm that generalizes over as many sett...
Anna Kasprzik
CLEIEJ
2006
87views more  CLEIEJ 2006»
15 years 5 months ago
Integrity Constraint Checking in Distributed Nested Transactions over a Database Cluster
This paper presents a solution to check referential integrity constraints and conjunctive global constraints in a relational multi database system. It also presents the experiment...
Stéphane Gançarski, Claudia Le&oacut...
ICDE
2008
IEEE
175views Database» more  ICDE 2008»
16 years 6 months ago
Continuous Intersection Joins Over Moving Objects
The continuous intersection join query is computationally expensive yet important for various applications on moving objects. No previous study has particularly addressed this que...
Rui Zhang 0003, Dan Lin, Kotagiri Ramamohanarao, E...