Results 21 to 30 of about 629,332 (223)
Provenance Circuits for Trees and Treelike Instances (Extended Version) [PDF]
Query evaluation in monadic second-order logic (MSO) is tractable on trees and treelike instances, even though it is hard for arbitrary instances. This tractability result has been extended to several tasks related to query evaluation, such as counting ...
B Kimelfeld +3 more
core +2 more sources
Redactable Signatures for Signed CDA Documents [PDF]
[[abstract]]The Clinical Document Architecture, introduced by Health Level Seven, is a XML-based standard intending to specify the encoding, structure, and semantics of clinical documents for exchange.
[[corresponding]]Z. Y. Wu (d96922021@ntu.edu.tw) +1 more
core +1 more source
Pairwise similarity of TopSig document signatures [PDF]
This paper analyses the pairwise distances of signatures produced by the TopSig retrieval model on two document collections. The distribution of the distances are compared to purely random signatures. It explains why TopSig is only competitive with state
De Vries, Christopher, Geva, Shlomo
core +2 more sources
XML data integrity based on concatenated hash function [PDF]
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core
A monitoring approach for runtime service discovery [PDF]
Effective runtime service discovery requires identification of services based on different service characteristics such as structural, behavioural, quality, and contextual characteristics.
Mahbub, K., Spanoudakis, G., Zisman, A.
core +1 more source
By engaging in different active exploration behaviors, the tactile perception system can generate distinct signal modes, enabling the application of targeted decoding strategies for efficient and accurate perception of both external and internal object features.
Yuanzhi Zhou +8 more
wiley +1 more source
Non-Blocking Signature of very large SOAP Messages
Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like ...
Iacono, L. Lo, Kohring, G. A.
core +3 more sources
Confidentiality of XML documents by pool encryption [PDF]
The eXtensible Markup Language (XML) is a widely adopted format for documents containing structured information. Structured information contains both the content (words, images etc.) and the ‘markup’ which indicates the role of the content, e.g. ‘section’
Geuer-Pollmann, Christian
core +1 more source
FAST : a fault detection and identification software tool [PDF]
The aim of this work is to improve the reliability and safety of complex critical control systems by contributing to the systematic application of fault diagnosis.
Duatis Juárez, Jordi
core +4 more sources
Summary diagram for the role of CypA in chemoresistance in non‐small cell lung cancer (NSCLC). CypA is overexpressed in chemoresistance NSCLC and drives therapeutic evasion by competitively binding to the K37 site of SLC7A11, thereby blocking TRIM3 mediated K11‐linked ubiquitination and proteasomal degradation, ultimately inhibiting lipid peroxidation ...
Zhongcheng Wang +9 more
wiley +1 more source

