We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. RFID Security

    Living reference work entry 2024
  2. Protocol

    Living reference work entry 2024
  3. Vulnerability Metrics

    Living reference work entry 2024
  4. Threshold Signature

    Living reference work entry 2024
  5. Metrics of Software Security

    Guido Salvaneschi, Paolo Salvaneschi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  6. Theorem Proving and Security

    Living reference work entry 2024
  7. Oblivious RAM (ORAM)

    Alessandro Barenghi, Gerardo Pelosi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  8. Byzantine Agreement

    Living reference work entry 2024
  9. From Databases to Exchange Formats

    This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  10. Process Orchestration: Conceptual Design

    This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  11. kNN Join for Dynamic High-Dimensional Data: A Parallel Approach

    The k nearest neighbor (kNN) join operation is a fundamental task that combines two high-dimensional databases, enabling data points in the User...
    Nimish Ukey, Zhengyi Yang, ... Runze Li in Databases Theory and Applications
    Conference paper 2024
  12. Multi-level Storage Optimization for Intermediate Data in AI Model Training

    As Transformer-based large models become the mainstream of AI training, the development of hardware devices (e.g., GPUs) cannot keep up with the...
    Junfeng Fu, Yang Yang, ... Jie Shao in Databases Theory and Applications
    Conference paper 2024
  13. Take a Close Look at the Optimization of Deep Kernels for Non-parametric Two-Sample Tests

    The maximum mean discrepancy (MMD) test with deep kernel is a powerful method to distinguish whether two samples are drawn from the same...
    Xunye Tian, Feng Liu in Databases Theory and Applications
    Conference paper 2024
  14. Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental...
    Zhiyang Tang, **ghao Wang, ... Ying Zhang in Databases Theory and Applications
    Conference paper 2024
  15. Probabilistic Reverse Top-k Query on Probabilistic Data

    Reverse top-k queries have received much attention from research communities. The result of reverse top-k queries is a set of objects, which had the...
    Trieu Minh Nhut Le, **li Cao in Databases Theory and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.