Results 21 to 30 of about 629,332 (223)

Provenance Circuits for Trees and Treelike Instances (Extended Version) [PDF]

open access: yes, 2015
Query evaluation in monadic second-order logic (MSO) is tractable on trees and treelike instances, even though it is hard for arbitrary instances. This tractability result has been extended to several tasks related to query evaluation, such as counting ...
B Kimelfeld   +3 more
core   +2 more sources

Redactable Signatures for Signed CDA Documents [PDF]

open access: yes
[[abstract]]The Clinical Document Architecture, introduced by Health Level Seven, is a XML-based standard intending to specify the encoding, structure, and semantics of clinical documents for exchange.
[[corresponding]]Z. Y. Wu (d96922021@ntu.edu.tw)   +1 more
core   +1 more source

Pairwise similarity of TopSig document signatures [PDF]

open access: yes, 2012
This paper analyses the pairwise distances of signatures produced by the TopSig retrieval model on two document collections. The distribution of the distances are compared to purely random signatures. It explains why TopSig is only competitive with state
De Vries, Christopher, Geva, Shlomo
core   +2 more sources

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

A monitoring approach for runtime service discovery [PDF]

open access: yes, 2010
Effective runtime service discovery requires identification of services based on different service characteristics such as structural, behavioural, quality, and contextual characteristics.
Mahbub, K., Spanoudakis, G., Zisman, A.
core   +1 more source

Artificial Tactile Perception System for Exploring Internal and External Features of Objects via Time‐Frequency Features

open access: yesAdvanced Science, EarlyView.
By engaging in different active exploration behaviors, the tactile perception system can generate distinct signal modes, enabling the application of targeted decoding strategies for efficient and accurate perception of both external and internal object features.
Yuanzhi Zhou   +8 more
wiley   +1 more source

Non-Blocking Signature of very large SOAP Messages

open access: yes, 2007
Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like ...
Iacono, L. Lo, Kohring, G. A.
core   +3 more sources

Confidentiality of XML documents by pool encryption [PDF]

open access: yes, 2004
The eXtensible Markup Language (XML) is a widely adopted format for documents containing structured information. Structured information contains both the content (words, images etc.) and the ‘markup’ which indicates the role of the content, e.g. ‘section’
Geuer-Pollmann, Christian
core   +1 more source

FAST : a fault detection and identification software tool [PDF]

open access: yes, 2016
The aim of this work is to improve the reliability and safety of complex critical control systems by contributing to the systematic application of fault diagnosis.
Duatis Juárez, Jordi
core   +4 more sources

CypA Mediates Non‐Small Cell Lung Cancer Chemoresistance by Attenuating Ferroptosis via Stabilizing SLC7A11

open access: yesAdvanced Science, EarlyView.
Summary diagram for the role of CypA in chemoresistance in non‐small cell lung cancer (NSCLC). CypA is overexpressed in chemoresistance NSCLC and drives therapeutic evasion by competitively binding to the K37 site of SLC7A11, thereby blocking TRIM3 mediated K11‐linked ubiquitination and proteasomal degradation, ultimately inhibiting lipid peroxidation ...
Zhongcheng Wang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy