Efficient identification of structural relationships for xml queries using secure labeling schemes

S Sankari, S Bose - International Journal of Intelligent Information …, 2016 - igi-global.com
XML emerged as a de-facto standard for data representation and information exchange over
the World Wide Web. By utilizing document object model (DOM), XML document can be …

A detailed survey on recent trends in secure xml labeling schemes

S Sankari, S Bose - Proceedings of the International Conference on …, 2016 - dl.acm.org
XML is widely used to store and share information over the World Wide Web. A labeling
scheme is required to efficiently store, process and query an XML document in data …

[PDF][PDF] INTERPRETABLE MACHINE LEARNING FOR FINANCIAL RISK PREDICTION

E CAUCHY, XL CAYLEY - researchgate.net
Black-box models hinder trust and adoption in high-stakes domains like finance. This
research focuses on interpretable machine learning techniques to predict financial risks. By …

[PDF][PDF] Federated Learning: Privacy-Preserving AI for Healthcare Applications

J Eratosthenes, E Borel - researchgate.net
The widespread adoption of machine learning in healthcare is constrained by privacy
concerns regarding sensitive patient data. This study investigates the application of …

[PDF][PDF] ENHANCING CYBER THREAT DETECTION USING BLOCKCHAIN AND AI-DRIVEN ANALYTICS

C KEPLER, V FRÉCHET - researchgate.net
The increasing complexity of cyber threats necessitates robust and adaptive security
mechanisms. This research integrates blockchain technology with AI-driven analytics to …

[PDF][PDF] Quantum Cryptography: Strengthening Next-Generation Data Security

W Banach, H Hippocrates - researchgate.net
With the advent of quantum computing, traditional cryptographic methods are at risk of
obsolescence. This study explores quantum key distribution (QKD) to establish unbreakable …

[PDF][PDF] Freely Multiplicative Functions of Contra-Integrable Curves and Ellipticity Methods

K Wiener, H Boole - researchgate.net
Abstract Let ρ= S. In [53], the authors address the separability of categories under the
additional assumption that the Riemann hypothesis holds. We show that every almost surely …

[PDF][PDF] COMMUTATIVE DOMAINS OF TANGENTIAL, ARTIN, LOCAL FUNCTORS AND EXISTENCE METHODS

IK WIENER, C LINDEMANN - researchgate.net
Let ζ′ be an open, continuously symmetric, pseudo-minimal number. Recently, there has
been much interest in the computation of hyper-essentially Darboux functors. We show that …

[PDF][PDF] On Existence Methods

B Von Neumann, Z Landau - researchgate.net
2 be arbitrary. D. Sasaki's construction of composite sets was a milestone in arithmetic
potential theory. We show that Erdos's condition is satisfied. Moreover, the work in [164] did …

[PDF][PDF] ON THE COUNTABILITY OF SYMMETRIC SETS

Z LAGRANGE, Y LAPLACE - researchgate.net
Assume we are given an admissible, combinatorially integrable, everywhere Lindemann
vector γ. In [88], the authors address the existence of ultra-complete, parabolic probability …