Pods, 92

Pods, 92

Author:

Publisher: Association for Computing Machinery (ACM)

Published: 1992-12

Total Pages: 400

ISBN-13: 9780897915199

DOWNLOAD EBOOK


Database Systems For Advanced Applications '93 - Proceedings Of The 3rd International Symposium On Database Systems For Advanced Applications

Database Systems For Advanced Applications '93 - Proceedings Of The 3rd International Symposium On Database Systems For Advanced Applications

Author: S C Moon

Publisher: World Scientific

Published: 1993-03-18

Total Pages: 470

ISBN-13: 9814603767

DOWNLOAD EBOOK

This proceedings volume contains 52 technical research papers on multidatabases, distributed DB, multimedia DB, object-oriented DB, real-time DB, temporal DB, deductive DB, and intelligent user interface. Some industrial papers are also included.


SCAI '97

SCAI '97

Author: G. Grahne

Publisher: IOS Press

Published: 1997

Total Pages: 312

ISBN-13: 9789051993547

DOWNLOAD EBOOK

The major theme of this book is Intelligent Agents. An agent is a hardware or software system that is autonomous, interactive with and reactive to its environment and other agents. An agent can also be pro-active in taking the initiative in goal-directed behaviour. Intelligent Agents are one of the most important and exciting areas of research and development in computer science today.


Active Database Systems

Active Database Systems

Author: Jennifer Widom

Publisher: Morgan Kaufmann

Published: 1995-09

Total Pages: 360

ISBN-13: 9781558603042

DOWNLOAD EBOOK

Active database systems enhance traditional database functionality with powerful rule-processing capabilities, providing a uniform and efficient mechanism for many database system applications. Among these applications are integrity constraints, views, authorization, statistics gathering, monitoring and alerting, knowledge-based systems, expert systems, and workflow management. This significant collection focuses on the most prominent research projects in active database systems. The project leaders for each prototype system provide detailed discussions of their projects and the relevance of their results to the future of active database systems. Features: A broad overview of current active database systems and how they can be extended and improved A comprehensive introduction to the core topics of the field, including its motivation and history Coverage of active database (trigger) capabilities in commercial products Discussion of forthcoming standards


Computational Logic — CL 2000

Computational Logic — CL 2000

Author: John Lloyd

Publisher: Springer

Published: 2003-06-26

Total Pages: 1399

ISBN-13: 3540449574

DOWNLOAD EBOOK

These are the proceedings of the First International Conference on Compu- tional Logic (CL 2000) which was held at Imperial College in London from 24th to 28th July, 2000. The theme of the conference covered all aspects of the theory, implementation, and application of computational logic, where computational logic is to be understood broadly as the use of logic in computer science. The conference was collocated with the following events: { 6th International Conference on Rules and Objects in Databases (DOOD 2000) { 10th International Workshop on Logic-based Program Synthesis and Tra- formation (LOPSTR 2000) { 10th International Conference on Inductive Logic Programming (ILP 2000). CL 2000 consisted of seven streams: { Program Development (LOPSTR 2000) { Logic Programming: Theory and Extensions { Constraints { Automated Deduction: Putting Theory into Practice { Knowledge Representation and Non-monotonic Reasoning { Database Systems (DOOD 2000) { Logic Programming: Implementations and Applications. The LOPSTR 2000 workshop constituted the program development stream and the DOOD 2000 conference constituted the database systems stream. Each stream had its own chair and program committee, which autonomously selected the papers in the area of the stream. Overall, 176 papers were submitted, of which 86 were selected to be presented at the conference and appear in these proceedings. The acceptance rate was uniform across the streams. In addition, LOPSTR 2000 accepted about 15 extended abstracts to be presented at the conference in the program development stream.


Deductive and Object-Oriented Databases

Deductive and Object-Oriented Databases

Author: Stefano Ceri

Publisher: Springer Science & Business Media

Published: 1993-11-16

Total Pages: 504

ISBN-13: 9783540575306

DOWNLOAD EBOOK

This volume contains the proceedings of the Third International Conference on Deductive and Object-Oriented Databases. Its central tenet is that the object-oriented and deductive paradigms for modeling, organizing, and processing data complement each other, rather than competing, and that problems involving massive volumes of complex data can best be solved by integrating the best of both approaches. Central questions in the area are: - How do we design a tool that presents the best of the object-oriented and declarative ideas? - How can the users of this tool express their problems in a combination of declarative and procedural features? The volume includes 29 papers that contribute towards answering these questions.


Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing

Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing

Author:

Publisher:

Published: 2003

Total Pages: 388

ISBN-13:

DOWNLOAD EBOOK

This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of parties. Given two numbers x and e, the protocol computes y such that ye=x (mod N). A synchronous protocol for this task has been presented by Catalano, Gennaro, and Halevi (Eurocrypt 2000), but the standard approach for turning this into an asynchronous protocol would require a Byzantine-agreement sub-protocol. Our protocol adopts their approach, but exploits a feature of the problem in order to avoid the use of a Byzantine agreement primitive. Hence, it leads to efficient asynchronous protocols for threshold signatures and for Byzantine agreement based on the strong RSA assumption, without the use of random oracles.