Sciweavers

4052 search results - page 705 / 811
» Using RDF to describe networks
Sort
View
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
15 years 10 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
CHI
2008
ACM
15 years 10 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
VLDB
2002
ACM
157views Database» more  VLDB 2002»
15 years 10 months ago
A formal perspective on the view selection problem
The view selection problem is to choose a set of views to materialize over a database schema, such that the cost of evaluating a set of workload queries is minimized and such that ...
Rada Chirkova, Alon Y. Halevy, Dan Suciu
ESSOS
2010
Springer
15 years 6 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
CHI
2010
ACM
15 years 4 months ago
Here's what i did: sharing and reusing web activity with ActionShot
ActionShot is an integrated web browser tool that creates a fine-grained history of users’ browsing activities by continually recording their browsing actions at the level of in...
Ian Li, Jeffrey Nichols, Tessa A. Lau, Clemens Dre...