Sciweavers

264 search results - page 50 / 53
» View security as the basis for data warehouse security
Sort
View
POPL
1998
ACM
15 years 1 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
MOC
2010
14 years 4 months ago
The structure of balanced multivariate biorthogonal multiwavelets and dual multiframelets
Abstract. Multiwavelets and multiframelets are of interest in several applications such as numerical algorithms and signal processing, due to their desirable properties such as hig...
Bin Han
143
Voted
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 11 days ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
ATAL
2009
Springer
15 years 4 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
14 years 11 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...