261 papers:
DATE-2015-LocatelliVMFVKK #architecture #energy- Spintronic devices as key elements for energy-efficient neuroinspired architectures (NL, AFV, AM, JSF, DV, JVK, JOK, WZ, JG, DQ), pp. 994–999.
PODS-2015-KoutrisW #complexity #consistency #constraints #query #self- The Data Complexity of Consistent Query Answering for Self-Join-Free Conjunctive Queries Under Primary Key Constraints (PK, JW), pp. 17–29.
VLDB-2015-AhmadK #distributed- Compaction Management in Distributed Key-Value Datastores (MYA, BK), pp. 850–861.
VLDB-2015-FanFTD #graph- Keys for Graphs (WF, ZF, CT, XLD), pp. 1590–1601.
VLDB-2015-KohlerLZ #sql- Possible and Certain SQL Key (HK, SL, XZ), pp. 1118–1129.
VLDB-2015-ZhangWYGLZ #in memory #named #throughput- Mega-KV: A Case for GPUs to Maximize the Throughput of In-Memory Key-Value Stores (KZ, KW, YY, LG, RL, XZ), pp. 1226–1237.
ICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSR-2015-SinhaSDPM #detection #repository #source code- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
HIMI-IKC-2015-Iwata #difference #learning- Method to Generate an Operation Learning Support System by Shortcut Key Differences in Similar Software (HI), pp. 332–340.
SCSM-2015-Flor #3d #process- 3D Virtual Worlds: An Ethnography of Key Artifacts and Processes (NVF), pp. 20–29.
CAiSE-2015-BrownL #probability #quality- Probabilistic Keys for Data Quality Management (PB, SL), pp. 118–132.
ICEIS-v2-2015-BarbarI #named- BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
SIGIR-2015-ParkC #concept #retrieval #using- Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SAC-2015-BouaskerY #anti #constraints #correlation #mining- Key correlation mining by simultaneous monotone and anti-monotone constraints checking (SB, SBY), pp. 851–856.
SAC-2015-GouthamLY #authentication #protocol #smarttech #using- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SAC-2015-MinHJCH #distributed #performance #process #scalability- An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
HPCA-2015-RosDK #classification #clustering #performance- Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies (AR, MD, SK), pp. 186–197.
ICLP-J-2015-MannaRT #consistency #query #scalability- Taming primary key violations to query large inconsistent data via ASP (MM, FR, GT), pp. 696–710.
CASE-2014-HungPC #component #industrial- A logistics integrated service model in Taiwan FTZ for foreign key components supply of bicycle industry (YWH, HHP, HCC), pp. 600–602.
CASE-2014-TiengYHC #approach #multi #optimisation #process- A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
CASE-2014-ZhangLYL #optimisation #parametricity #simulation- Simulation and parameter optimization of the key working procedure of engine box (CZ, JL, RY, GL), pp. 315–319.
DATE-2014-BhargavaM #encryption #generative #performance #reliability- An efficient reliable PUF-based cryptographic key generator in 65nm CMOS (MB, KM), pp. 1–6.
DATE-2014-CortezRHN #testing- Testing PUF-based secure key storage circuits (MC, GR, SH, GDN), pp. 1–6.
DATE-2014-DelvauxV- Key-recovery attacks on various RO PUF constructions via helper data manipulation (JD, IV), pp. 1–6.
VLDB-2014-ChenNC #detection #performance #sql- Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
VLDB-2014-Song0C #on the #set- On Concise Set of Relative Candidate Keys (SS, LC, HC), pp. 1179–1190.
ITiCSE-2014-Dorge #approach- A methodological approach to key competencies in informatics (CD), pp. 201–206.
STOC-2014-MillerS #protocol #quantum #robust #using- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
ICALP-v1-2014-IaconoO #why- Why Some Heaps Support Constant-Amortized-Time Decrease-Key Operations, and Others Do Not (JI, ÖÖ), pp. 637–649.
CHI-2014-RogersPBVMV #people- Never too old: engaging retired people inventing the future with MaKey MaKey (YR, JP, MB, KV, GM, FV), pp. 3913–3922.
HIMI-DE-2014-ItoW #challenge #communication- Three Key Challenges in ARM-COMS for Entrainment Effect Acceleration in Remote Communication (TI, TW), pp. 177–186.
ICEIS-v1-2014-PintoB #architecture #health #implementation- Architectural Key Dimensions for a Successful Electronic Health Record Implementation (EP, ACB), pp. 136–143.
CIKM-2014-HannulaKL #independence #on the- On Independence Atoms and Keys (MH, JK, SL), pp. 1229–1238.
ICPR-2014-GaoRKL #documentation- Embedding Document Structure to Bag-of-Words through Pair-wise Stable Key-Regions (HG, MR, DK, JL), pp. 2903–2908.
ICPR-2014-IoannidisCL #clustering #modelling #multi #using- Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPR-2014-LeNVOT #documentation #retrieval #using- Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
SAC-2014-JangKCH #replication- Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.
SAC-2014-LiuTZ #constraints #mining- Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SAC-2014-YoonY #authentication #network #using- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
ASPLOS-2014-GutierrezCGDCM #3d #design #physics- Integrated 3D-stacked server designs for increasing physical density of key-value stores (AG, MC, BG, RGD, LC, TNM), pp. 485–498.
ISMM-2014-Joisha #performance #scalability- Sticky tries: fast insertions, fast lookups, no deletions for large key universes (PGJ), pp. 35–46.
ICDAR-2013-GaoRKLSIK #detection #documentation #image #retrieval- Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
ICDAR-2013-ToselliV #approach #documentation #performance #word- Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
SIGMOD-2013-ArenasDNUBV #xml- Discovering XSD keys from XML data (MA, JD, FN, MU, JVdB, SV), pp. 61–72.
VLDB-2013-Dey #scalability #transaction- Scalable Transactions across Heterogeneous NoSQL Key-Value Data Stores (AD), pp. 1434–1439.
CHI-2013-BaillyPDW #named- Métamorphe: augmenting hotkey usage with actuated keys (GB, TP, JD, DJW), pp. 563–572.
CHI-2013-YinOPZ #adaptation #approach- Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
DHM-HB-2013-HuhK #estimation #image #using- Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
DHM-HB-2013-KimATBHJ #performance #process #type system- The Effects of Touch Screen Virtual Keyboard Key Sizes on Typing Performance, Typing Biomechanics and Muscle Activity (JHK, LSA, OT, MCB, CAH, PWJ), pp. 239–244.
HCI-AMTE-2013-FuglerudS #design- The Link between Inclusive Design and Innovation: Some Key Elements (KSF, DS), pp. 41–50.
HCI-III-2013-KunoST- Long-Term Study of a Software Keyboard That Places Keys at Positions of Fingers and Their Surroundings (YK, BS, JT), pp. 72–81.
HCI-IMT-2013-KurosawaST- Keyboard Clawing: Input Method by Clawing Key Tops (TK, BS, JT), pp. 272–280.
ICEIS-v2-2013-MachadoPATWO- Situation-awareness as a Key for Proactive Actions in Ambient Assisted Living (AM, AMP, IA, LHT, LKW, JPMdO), pp. 418–426.
KDD-2013-LeeLM #evolution #keyword #named #social- KeySee: supporting keyword search on evolving events in social streams (PL, LVSL, EEM), pp. 1478–1481.
SAC-2013-ChoCC #ad hoc #mobile #network #trust- Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
HPDC-2013-Al-ShishtawyV #named- ElastMan: autonomic elasticity manager for cloud-based key-value stores (AAS, VV), pp. 115–116.
HPDC-2013-CostaDOR #3d #clustering #named #network #stack- CamCubeOS: a key-based network stack for 3D torus cluster topologies (PC, AD, GO, AITR), pp. 73–84.
SIGMOD-2012-TatemuraPHH #named #sql- Partiqle: an elastic SQL engine over key-value stores (JT, OP, WPH, HH), pp. 629–632.
WCRE-2012-CleveH #question #what- What Do Foreign Keys Actually Mean? (AC, JLH), pp. 299–307.
AdaEurope-2012-RuizCM #ada #development #source code- Source Code as the Key Artifact in Requirement-Based Development: The Case of Ada 2012 (JFR, CC, YM), pp. 49–59.
CIKM-2012-QinZWWZH #migration #optimisation- Optimizing data migration for cloud-based key-value stores (XQ, WZ, WW, JW, XZ, TH), pp. 2204–2208.
CIKM-2012-QureshiOP #n-gram #using #wiki- Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKM-2012-WangWLL #graph #keyword #ranking #using #wiki- Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
ICPR-2012-LiuSZWBCT #bound #detection- Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPR-2012-XuLYWSL- Key frame selection based on Jensen-Rényi divergence (QX, XL, ZY, JW, MS, JL), pp. 1892–1895.
ICPR-2012-ZhuLWL #effectiveness #video- Key observation selection for effective video synopsis (XZ, JL, JW, HL), pp. 2528–2531.
KDD-2012-Posse #lessons learnt #network #recommendation #scalability #social- Key lessons learned building recommender systems for large-scale social networks (CP), p. 587.
SAC-2012-MavrogiannopoulosTP #encryption #framework #kernel #linux- A linux kernel cryptographic framework: decoupling cryptographic keys from applications (NM, MT, BP), pp. 1435–1442.
ICDAR-2011-SaabniB #performance- Fast Key-Word Searching via Embedding and Active-DTW (RS, AB), pp. 68–72.
SIGMOD-2011-DebnathSL #named #ram- SkimpyStash: RAM space skimpy key-value store on flash-based storage (BKD, SS, JL), pp. 25–36.
ITiCSE-2011-VihavainenPLK #scalability- Extreme apprenticeship method: key practices and upward scalability (AV, MP, ML, JK), pp. 273–277.
STOC-2011-LewkoLW #how- How to leak on key updates (ABL, ML, BW), pp. 725–734.
DUXU-v1-2011-KarschS #precise #safety #usability- Terminological Precision — A Key Factor in Product Usability and Safety (BIK, GS), pp. 138–147.
DUXU-v2-2011-HeimgartnerTW #design #human-computer- Empathy as Key Factor for Successful Intercultural HCI Design (RH, LWT, HW), pp. 557–566.
HCI-DDA-2011-NebeP #re-engineering #requirements #usability- Key Requirements for Integrating Usability Engineering and Software Engineering (KN, VP), pp. 114–120.
HIMI-v1-2011-NamPKLW #authentication- Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
ICEIS-v2-2011-LiOAK #fault #identification #modelling #network #using- Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
KDD-2011-Boire #case study #data mining #lessons learnt #mining- The practitioner’s viewpoint to data mining: key lessons learned in the trenches and case studies (RB), p. 785.
SAC-2011-MunizL #encryption #on the #protocol #recognition- On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
SPLC-2011-YoshimuraSOOAKWF #experience #multi #process #product line- Key Activities for Introducing Software Product Lines into Multiple Divisions: Experience at Hitachi (KY, JS, TO, CO, YA, SK, SW, KF), pp. 261–266.
SOSP-2011-LimFAK #named- SILT: a memory-efficient, high-performance key-value store (HL, BF, DGA, MK), pp. 1–13.
DATE-2010-KlumppRW #3d- 3D-integration of silicon devices: A key technology for sophisticated products (AK, PR, RW), pp. 1678–1683.
PODS-2010-BenderHK #performance- Performance guarantees for B-trees with different-sized atomic keys (MAB, HH, BCK), pp. 305–316.
VLDB-2010-DebnathSL #named #persistent #throughput- FlashStore: High Throughput Persistent Key-Value Store (BKD, SS, JL), pp. 1414–1425.
VLDB-2010-ZhangHOPS #multi #on the- On Multi-Column Foreign Key Discovery (MZ, MH, BCO, CMP, DS), pp. 805–814.
ITiCSE-2010-Yeti- Science, technology and innovation: a key driver for economic growth (NY), p. 1.
STOC-2010-ApplebaumBW #encryption- Public-key cryptography from different assumptions (BA, BB, AW), pp. 171–180.
ICALP-v1-2010-LibertY #encryption #performance- Efficient Completely Non-malleable Public Key Encryption (BL, MY), pp. 127–139.
ICALP-v1-2010-YaoYZ #concurrent- Concurrent Knowledge Extraction in the Public-Key Model (ACCY, MY, YZ), pp. 702–714.
CAiSE-2010-JarkeLLMR #design #requirements- The Brave New World of Design Requirements: Four Key Principles (MJ, PL, KL, JM, WNR), pp. 470–482.
ICEIS-AIDSS-2010-GilS #implementation #performance #process #using- Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICPR-2010-BaysalKD #using- Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPR-2010-GudkovU #approach- A Topologic Approach to User-Dependent Key Extraction from Fingerprints (VYG, OU), pp. 1281–1284.
ICPR-2010-LiuLH #learning #multi #representation #using- Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPR-2010-ZhangXL #detection #video- Extracting Key Sub-trajectory Features for Supervised Tactic Detection in Sports Video (YZ, CX, HL), pp. 125–128.
KEOD-2010-BarrosoAG #encryption #hardware #in the cloud #process- Key Management Process on the Hardware Cryptographic Module in the Cloud Computing (JMDB, LJA, PGG), pp. 493–496.
SAC-2010-BlackshearV- R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks (SB, RMV), pp. 1985–1992.
SAC-2010-SulaymanM #process #web- Quantitative assessments of key success factors in software process improvement for small and medium web companies (MS, EM), pp. 2319–2323.
SPLC-2010-LeeK #feature model- Usage Context as Key Driver for Feature Selection (KL, KCK), pp. 32–46.
OSDI-2010-GeambasuLKKL #distributed #named- Comet: An active distributed key-value store (RG, AAL, TK, AK, HML), pp. 323–336.
HT-2009-KuflikP- User model on a key (TK, KP), pp. 371–372.
VLDB-2009-LometM #transaction- Locking Key Ranges with Unbundled Transaction Services (DBL, MFM), pp. 265–276.
ICPC-2009-Rajlich #comprehension- Intensions are a key to program comprehension (VR), pp. 1–9.
STOC-2009-DodisW #encryption #symmetry- Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
STOC-2009-Peikert #problem #worst-case- Public-key cryptosystems from the worst-case shortest vector problem: extended abstract (CP), pp. 333–342.
CHI-2009-MaedaIA- Arrow tag: a direction-key-based technique for rapidly selecting hyperlinks while gazing at a screen (AM, HI, MA), pp. 1025–1028.
HCI-AUII-2009-FarajMV #mobile #named- BigKey: A Virtual Keyboard for Mobile Devices (KAF, MM, NV), pp. 3–10.
HCI-AUII-2009-JiK #named #using- CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HIMI-II-2009-BaekPY #approach #comprehension #mobile- Understanding Key Attributes in Mobile Service: Kano Model Approach (SIB, SKP, WSY), pp. 355–364.
ICEIS-AIDSS-2009-SmutsML #information management #tool support- Key Characteristics in Selecting Software Tools for Knowledge Management (HS, AvdM, ML), pp. 170–179.
RE-2009-Zowghi #challenge #education #requirements- Requirements Engineering Education and Training: Key Challenges and Practical Solutions (DZ), p. 358.
SAC-2009-NecaskyM #query #xml- Discovering XML keys and foreign keys in queries (MN, IM), pp. 632–638.
SAC-2009-PinoGP #process- Key processes to start software process improvement in small companies (FJP, FG, MP), pp. 509–516.
SAC-2009-TangCCXHTC #network #peer-to-peer- Securing key issuing in peer-to-peer networks (CT, RC, ZC, AX, JbH, LT, ZC), pp. 84–85.
SPLC-2009-OLearyRRT #case study #experience #independence #process #research- Important issues and key activities in product derivation: experiences from two independent research projects (PO, RR, IR, ST), pp. 121–130.
DATE-2008-FanBSV #algebra #design #encryption- FPGA Design for Algebraic Tori-Based Public-Key Cryptography (JF, LB, KS, IV), pp. 1292–1297.
PODS-2008-JhaRS #constraints #evaluation #query- Query evaluation with soft-key constraints (AKJ, VR, DS), pp. 119–128.
VLDB-2008-PoessN #analysis #challenge #energy #power management- Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
ITiCSE-2008-DorgeS #question #what- What are information technology’s key qualifications? (CD, CS), pp. 296–300.
SCAM-2008-BinkleyGHLM #analysis- Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
ICALP-C-2008-KolesnikovR #authentication- Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
ICALP-C-2008-OstrovskyPV #concurrent- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model (RO, GP, IV), pp. 548–559.
ICEIS-ISAS2-2008-NgoWL #authentication #network- A Group Authentication Model for Wireless Network Services Based on Group Key Management (HHN, XW, PDL), pp. 182–188.
CIKM-2008-MacdonaldO #ranking- Key blog distillation: ranking aggregates (CM, IO), pp. 1043–1052.
ECIR-2008-CloughR #design #image #using #visualisation- Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ICPR-2008-WangLLSX #adaptation #automation #video #word- Automatic video annotation with adaptive number of key words (FW, WL, JL, MS, DX), pp. 1–4.
SIGIR-2008-BenderskyC #concept #query- Discovering key concepts in verbose queries (MB, WBC), pp. 491–498.
SAC-2008-VictorCTC #recommendation #trust- Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
HPDC-2008-ShafaatSMHGR #consistency #network- Key-based consistency and availability in structured overlay networks (TMS, TS, MM, SH, AG, AR), pp. 235–236.
DAC-2007-SuhD #authentication #generative #physics- Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
CSEET-2007-RootRT #concept #re-engineering- Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
TACAS-2007-CortierKS #analysis #automation #security- Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
WCRE-2007-Marinescu #constraints #enterprise- Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications (CM), pp. 100–109.
ICALP-2007-BellareR #design- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms (MB, TR), pp. 399–410.
ICALP-2007-FurukawaA #black box #encryption- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
HCI-IPT-2007-ChoiY #multi #named #network- MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks (SJC, HYY), pp. 808–817.
HCI-IPT-2007-YoonL #named- BetweenKeys: Looking for Room Between Keys (YY, GL), pp. 504–512.
HCI-MIE-2007-KopparapuSR #concept #parsing- Minimal Parsing Key Concept Based Question Answering System (SKK, AS, PVSR), pp. 104–113.
OCSC-2007-MaAL #authentication #protocol- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
ICEIS-J-2007-YasuiLGWT07a #collaboration #online- Key Elements Extraction in Online Collaborative Environments (NIY, XL, DEG, YW, HT), pp. 148–159.
ICEIS-SAIC-2007-DandashWLS #detection #internet- A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection (OD, YW, PDL, BS), pp. 57–62.
ICEIS-SAIC-2007-MorgadoRP #evaluation #learning- Key Issues for Learning Objects Evaluation (EMM, ÁBR, FJGP), pp. 149–154.
CIKM-2007-BotelhoZ #scalability #set- External perfect hashing for very large key sets (FCB, NZ), pp. 653–662.
ECIR-2007-CioccaS #video- Hierarchical Browsing of Video Key Frames (GC, RS), pp. 691–694.
MLDM-2007-CoenenLSW #classification #identification #statistics- Statistical Identification of Key Phrases for Text Classification (FC, PHL, RS, YJW), pp. 838–853.
CGO-2007-Fang #parallel #programming- Parallel Programming Environment: A Key to Translating Tera-Scale Platforms into a Big Success (JF), p. 18.
PPoPP-2007-Fang #parallel #programming- Parallel programming environment: a key to translating tera-scale platforms into a big success (JZF), p. 1.
SOSP-2007-DeCandiaHJKLPSVV #named- Dynamo: amazon’s highly available key-value store (GD, DH, MJ, GK, AL, AP, SS, PV, WV), pp. 205–220.
VLDB-2006-SismanisBHR #named #performance #scalability- GORDIAN: Efficient and Scalable Discovery of Composite Keys (YS, PB, PJH, BR), pp. 691–702.
ICSM-2006-JansenB #deployment #process #validation- Definition and Validation of the Key process of Release, Delivery and Deployment for Product Software Vendors: turning the ugly duckling into a swan (SJ, SB), pp. 166–175.
ICALP-v2-2006-FouquePSZ- Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (PAF, DP, JS, SZ), pp. 240–251.
ICALP-v2-2006-PhanST #hybrid- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability (DHP, RSN, DT), pp. 264–275.
CHI-2006-WobbrockMR #gesture- Few-key text entry revisited: mnemonic gestures on four keys (JOW, BAM, BR), pp. 489–492.
ICEIS-ISAS-2006-GoeppK #information management #problem #question #requirements- Key-Problem and Goal Driven Requirements Engineering — Which Complementarities for Manufacturing Information Systems? (VG, FK), pp. 102–109.
CIKM-2006-CongFG- Annotation propagation revisited for key preserving views (GC, WF, FG), pp. 632–641.
ICPR-v2-2006-MakkapatiM #encoding #using- Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPR-v4-2006-HeCTW- Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
ICPR-v4-2006-ZhengLZ #encryption #generative #using- Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDD-2006-ZhangL #classification #string- Extracting key-substring-group features for text classification (DZ, WSL), pp. 474–483.
SEKE-2006-ChangLK #architecture #metric #product line- Key Issues and Metrics for Evaluating Product Line Architectures (SHC, HJL, SDK), pp. 212–219.
IJCAR-2006-TomanW #dependence #functional #logic #on the- On Keys and Functional Dependencies as First-Class Citizens in Description Logics (DT, GEW), pp. 647–661.
DATE-2005-Abdel-HamidTA #design- A Public-Key Watermarking Technique for IP Designs (ATAH, ST, EMA), pp. 330–335.
DATE-2005-CilardoMMR #architecture #encryption #novel- A Novel Unified Architecture for Public-Key Cryptography (AC, AM, NM, LR), pp. 52–57.
ICDAR-2005-LiuFZL #documentation #image #retrieval- Document Image Retrieval Based on Density Distribution Feature and Key Block Feature (HL, SF, HZ, XL), pp. 1040–1044.
STOC-2005-Holenstein- Key agreement from weak bit agreement (TH), pp. 664–673.
ICALP-2005-CrescenzoV #concurrent- Concurrent Zero Knowledge in the Public-Key Model (GDC, IV), pp. 816–827.
ICALP-2005-MaurerS- Single-Key AIL-MACs from Any FIL-MAC (UMM, JS), pp. 472–484.
CIKM-2005-GriecoLRR #algorithm #consistency #dependence #query- Consistent query answering under key and exclusion dependencies: algorithms and experiments (LG, DL, RR, MR), pp. 792–799.
CIKM-2005-Yeh #bound- An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription (JhY), pp. 285–286.
ECIR-2005-YangJZY #documentation #effectiveness #retrieval #using- Improving Retrieval Effectiveness by Using Key Terms in Top Retrieved Documents (LY, DHJ, GZ, NY), pp. 169–184.
KDD-2005-MorinagaAISA #dependence #mining #semantics- Key semantics extraction by dependency tree mining (SM, HA, TI, YS, SA), pp. 666–671.
SAC-2005-BicakciCT #certification #how #metric #trust- How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SAC-2005-Strangio #performance #protocol- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
DATE-DF-2004-FaroukS #architecture #design #implementation- Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA (HAF, MS), pp. 212–217.
CSEET-2004-TomaykoCLSS #architecture #education- Key Considerations in Teaching Software Architecture (JET, SC, ML, MJS, DS), p. 174.
ESOP-2004-AbadiBF #performance #π-calculus- Just Fast Keying in the π Calculus (MA, BB, CF), pp. 340–354.
ICALP-2004-BlundoDS #bound #self- Definitions and Bounds for Self-Healing Key Distribution Schemes (CB, PD, ADS), pp. 234–245.
ICEIS-v1-2004-JuniorV #algorithm #graph #relational #xml- Keys Graph — Based Relational to XML Translation Algorithm (WMdAJ, CV), pp. 142–148.
ICEIS-v4-2004-BoppHE #weaving- Connecting Virtual Spaces: Shadow Objects as Key Elements for Weaving the Cooperative Space (TB, TH, BE), pp. 475–479.
CIKM-2004-AndrusBST #problem- Key problems in integrating structured and unstructured information (DCA, DB, JTS, ET), p. 360.
ICPR-v3-2004-ZhuK #segmentation- Key-Based Melody Segmentation for Popular Songs (YZ, MSK), pp. 862–865.
SAC-2004-SakuraiS #data-driven #database- Rule discovery from textual data based on key phrase patterns (SS, AS), pp. 606–612.
IJCAR-2004-SteelBM #induction #protocol- Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
ICDAR-2003-HullEGL #component #documentation #multi #video #visualisation- Visualizing Multimedia Content on Paper Documents: Components of Key Frame Selection for Video Paper (JJH, BE, JG, DSL), pp. 389–392.
STOC-2003-Thorup #constant #integer #problem- Integer priority queues with decrease key in constant time and the single source shortest paths problem (MT), pp. 149–158.
SEFM-2003-Dromey #design #formal method #requirements- From Requirements to Design: Formalizing the Key Steps (RGD), p. 2–?.
ICEIS-v2-2003-Raisinghani #enterprise #information management #taxonomy- Knowledge Management Systems for Leveraging Enterprise Data Resources: Taxonomy and Key Issues (MSR), pp. 519–521.
ICEIS-v3-2003-GoeppK #evolution #information management #problem #towards- Towards a Definition of the Key-Problems in Information System Evolution — Formulating Problems to Better Address Information System Projects (VG, FK), pp. 586–589.
ICEIS-v3-2003-HarrisonABBRTL #information management #network #re-engineering- Key Issues in Information Systems and Software Engineering — Views From a Joint Network of Practitioners and Academics (RH, DEA, KHB, RB, MR, DT, KL), pp. 357–363.
UML-2003-SteimannGM #modelling #object-oriented #on the- On the Key Role of Compositioning Object-Oriented Modelling (FS, JG, TAM), pp. 106–120.
ICGT-2002-Pfaltz #effectiveness #incremental #information management- Incremental Transformation of Lattices: A Key to Effective Knowledge Discovery (JLP), pp. 351–362.
CIKM-2002-GrahneZ #approximate #xml- Discovering approximate keys in XML data (GG, JZ), pp. 453–460.
CIKM-2002-WuY #adaptation #monitoring #multi #performance #query #using- Efficient query monitoring using adaptive multiple key hashing (KLW, PSY), pp. 477–484.
ICPR-v2-2002-AmerDM #independence #realtime #recognition- Context-Independent Real-Time Event Recognition: Application to Key-Image Extraction (AA, ED, AM), pp. 945–948.
SAC-2002-FerreiraD #embedded #mobile- Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
SAC-2002-LuSP #generative #implementation #performance #smarttech- Implementation of fast RSA key generation on smart cards (CL, ALMdS, FRP), pp. 214–220.
SPLC-2002-KangDKLL #development #product line #using- Using a Marketing and Product Plan as a Key Driver for Product Line Asset Development (KCK, PD, EK, JL, KL), pp. 366–382.
IWPC-2001-LiY #comprehension #concept #named- Simplicity: A Key Engineering Concept for Program Understanding (YL, HY), pp. 98–107.
SAC-2001-Yfantis #algorithm #video- An algorithm for key-frame determination in digital video (EAY), pp. 312–314.
STOC-2000-BihamBBMR #proving #quantum #security- A proof of the security of quantum key distribution (extended abstract) (EB, MB, POB, TM, VPR), pp. 715–724.
STOC-2000-KatzY #encryption #probability #security- Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
ICALP-2000-BaudronPS #multi #security- Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
WLC-2000-YamamuraK #protocol- Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
CHI-2000-LeeKM #design #internet #what- What makes Internet users visit cyber stores again? key design factors for customer loyalty (JL, JK, JYM), pp. 305–312.
ICEIS-2000-SheeTT #architecture- Keys to the Supply-Demand Architecture in Electronic Commerce (DYS, TIT, JtET), pp. 494–498.
ICPR-v1-2000-SanchezB #normalisation #recognition #video- Color Normalization for Appearance Based Recognition of Video Key-Frames (JMS, XB), pp. 1815–1818.
TOOLS-USA-2000-Williams #enterprise #integration- Keys to Enterprise Application Integration (JW), pp. 399–400.
ASPLOS-2000-BurkeMA #architecture #encryption #performance #symmetry- Architectural Support for Fast Symmetric-Key Cryptography (JB, JM, TMA), pp. 178–189.
ICALP-1999-GrossiI #data type #linked data #maintenance #multi #open data #performance- Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures (RG, GFI), pp. 372–381.
HCI-EI-1999-KitakazeAIF #adaptation #evaluation- Study of Adaptive Input System for Telecommunication Terminal — Evaluation of Discriminant which Controls Computer key-input - (SK, YA, TI, SF), pp. 74–78.
HCI-EI-1999-Thompson #feedback- Keyboard Tactile Feedback and its Effect on Keying Force Applied (DAT), pp. 157–161.
SOSP-1999-MazieresKKW #file system #security- Separating key management from file system security (DM, MK, MFK, EW), pp. 124–139.
STOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
STOC-1998-FrankelMY #distributed #generative #performance #robust- Robust Efficient Distributed RSA-Key Generation (YF, PDM, MY), pp. 663–672.
ICPR-1998-LiD #automation #identification #video- Automatic identification of text in digital video key frames (HL, DSD), pp. 129–132.
PODS-1997-AlbertIR #equivalence #query #relational- Conjunctive Query Equivalence of Keyed Relational Schemas (JA, YEI, RR), pp. 44–50.
STOC-1997-AjtaiD #equivalence #worst-case- A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence (MA, CD), pp. 284–293.
STOC-1997-Pan #equation #performance- Faster Solution of the Key Equation for Decoding BCH Error-Correcting Codes (VYP), pp. 168–175.
DLT-1997-Polemi #algebra #geometry- An Algebraic-Geometric Public Key Cryptosystem (DP), pp. 521–528.
HCI-CC-1997-PaulD #concept #design #multi #privacy- Privacy and Acting in Groups-Key Concepts in Designing Multimedia-Supported Cooperative Work (HP, SD), pp. 281–284.
HCI-SEC-1997-MorrisH #library- Potential Key Stress Factors Among Academic Library Assistants (AM, SH), pp. 407–410.
EDOC-1997-MunkeLCM #distributed #reuse- Type Management: A Key to Software Reuse in Open Distributed Systems (MM, WL, BOC, KMJ), pp. 78–89.
TACAS-1996-Lowe #protocol #using- Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
ICSM-1996-GarciaA #case study #maintenance- Maintainability as a key factor in maintenance productivity: a case study (MJBG, JCGA), p. 87–?.
STOC-1995-BellareR- Provably secure session key distribution: the three party case (MB, PR), pp. 57–66.
ICALP-1995-BaoI #automaton #finite- Break Finite Automata Public Key Cryptosystem (FB, YI), pp. 147–158.
SEKE-1995-Balmas #comprehension #source code- Classifying Programs: a Key For program Understanding (FB), pp. 342–349.
CHI-1994-MasuiN94b #editing #performance #predict- Repeat and predict — two keys to efficient text editing (TM, KN), pp. 118–123.
TRI-Ada-1994-Cherry #ada #formal method #paradigm #re-engineering #visualisation- Software Engineering with Ada in a New Key: Formalizing and Visualizing the Object Paradigm (GWC), pp. 309–320.
VLDB-1993-Lomet #concurrent- Key Range Locking Strategies for Improved Concurrency (DBL), pp. 655–664.
PEPM-1993-ConselPW #composition #incremental #operating system #partial evaluation #performance- Incremental Partial Evaluation: The Key to High Performance, Modularity and Portability in Operating Systems (CC, CP, JW), pp. 44–46.
HCI-ACS-1993-HuuhtanenVL #automation #communication #implementation #library #named- Communication — A Key Factor in Implementation of Library Automation (PH, MV, IL), pp. 976–981.
HCI-ACS-1993-KishinoH #estimation #student- A Code Key-in Time Estimation Method for College Students (SK, YH), pp. 624–629.
SEKE-1993-LoiaQ #logic programming #named #object-oriented- CLOS: A Key Issue To Bridge the Gap Between Object-Oriented and Logic Programming (VL, MQ), pp. 62–69.
FSE-1993-ZaremskiW #reuse- Signature Matching: A Key to Reuse (AMZ, JMW), pp. 182–190.
OOPSLA-1991-Hayes #using- Using Key Object Opportunism to Collect Old Objects (BH), pp. 33–46.
ICLP-1991-RollinsW #library #specification- Specifications as Search Keys for Software Libraries (EJR, JMW), pp. 173–187.
VLDB-1990-HardjonoS- Search Key Substitution in the Encipherment of B-Trees (TH, JS), pp. 50–58.
VLDB-1990-Mohan #concurrent #multi #named #transaction- ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
STOC-1990-GilHW #constant- Not All Keys Can Be Hashed in Constant Time (Preliminary Version) (JYG, FMadH, AW), pp. 244–253.
STOC-1990-NaorY- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
CAiSE-1990-Almgren #metric #motivation #quality- Quality Control: A Cornerstone to Quality — Measurement and Motivation are Key Issues (RA), p. 288.
PODS-1989-FaloutsosR #retrieval- Fractals for Secondary Key Retrieval (CF, SR), pp. 247–252.
FPCA-1989-Rittri #library #using- Using Types as Search Keys in Function Libraries (MR), pp. 174–183.
SOSP-1989-LomasGSN #risk management- Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.
STOC-1987-Munro- Searching a Two Key Table Under a Single Key (JIM), pp. 383–387.
PODS-1986-Robinson #linear #order #statistics #using- Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
PODS-1985-Kundu #algorithm- An Improved Algorithm for Finding a Key of a Relation (SK), pp. 189–192.
SIGMOD-1985-Otoo #multi- A Multidimensional Digital Hashing Scheme for Files With Composite Keys (EJO), pp. 214–229.
ICALP-1985-BilardiP #complexity #sorting- The Influence of Key Length on the Area-Time Complexity of Sorting (GB, FPP), pp. 53–62.
SIGMOD-1984-Kriegel #comparison #multi #performance #retrieval- Performance Comparison of Index Structures for Multi-Key Retrieval (HPK), pp. 186–196.
SIGMOD-1983-Lomet #performance- A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
STOC-1983-Adleman #on the- On Breaking Generalized Knapsack Public Key Cryptosystems (Abstract) (LMA), pp. 402–412.
STOC-1983-Blum #how- How to Exchange (Secret) Keys (Extended Abstract) (MB), pp. 440–447.
ICALP-1983-LescanneS #case study #data type #on the- On the Study Data Structures: Binary Tournaments with Repeated Keys (PL, JMS), pp. 466–477.
SIGIR-1983-Yannakoudakis #retrieval- Derived Search Keys for Bibliographic Retrieval (EJY), pp. 220–237.
SIGIR-1978-Yan #retrieval- Record Block Allocation for Retrieval on Secondary Keys (CSY), pp. 83–108.
ICSE-1976-BelfordBHS #development #effectiveness #named #specification- Specifications: A Key to Effective Software Development (PCB, AFB, DGH, LSS), pp. 71–79.
ICSE-1976-DreyfusK #design #development- The Preliminary Design as a Key to Successful Software Development (JMD, PJK), pp. 206–213.
SIGMOD-1975-FadousF #database #relational- Finding Candidate Keys for Relational Data Bases (RF, JF), pp. 203–210.
SIGFIDET-1972-WalkerG #data type #hybrid- Hybrid Trees: A Data Structure for Lists of Keys (WAW, CCG), pp. 189–211.