Sciweavers

603 search results - page 99 / 121
» Accessibility commons: a metadata infrastructure for web acc...
Sort
View
ISADS
1999
IEEE
13 years 12 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
AAAI
2006
13 years 9 months ago
Compilation of Query-Rewriting Problems into Tractable Fragments of Propositional Logic
We consider the problem of rewriting a query efficiently using materialized views. In the context of information integration, this problem has received significant attention in th...
Yolifé Arvelo, Blai Bonet, Maria-Esther Vid...
JMM2
2006
103views more  JMM2 2006»
13 years 7 months ago
Content Distribution for Telecom Carriers
-- Distribution of digital content is a key revenue opportunity for telecommunications carriers. As media content moves from analog and physical media-based distribution to digital...
Benjamin Falchuk, David Gorton, Dave Marples
PC
2002
189views Management» more  PC 2002»
13 years 7 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...