Sciweavers

5525 search results - page 999 / 1105
» Verification of Model Transformations
Sort
View
108
Voted
AUSAI
2003
Springer
15 years 6 months ago
Multimedia Analysis and Synthesis
We describe novel approaches to multimedia analysis and synthesis problems. We first present the experiential sampling technique which has the ability to focus on the analysis task...
Mohan S. Kankanhalli
CAISE
2003
Springer
15 years 6 months ago
On the Applicability of Rules to Automate Data Warehouse Logical Design
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
105
Voted
CAISE
2003
Springer
15 years 6 months ago
Towards the Automation of Data Warehouse Logical Design: a Rule-Based Approach
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
120
Voted
CCS
2003
ACM
15 years 6 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 6 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung