Sciweavers

1411 search results - page 149 / 283
» Building a database on S3
Sort
View
143
Voted
POS
1998
Springer
15 years 7 months ago
Persistent Java Objects in 3 Tier Architectures
The 3 tier architecture logically separates the functions of an application into a user interface component, a server business logic component, and a database component. Many appl...
Robert Bretl, Allen Otis, Marc San Soucie, Bruce S...
111
Voted
CHI
1997
ACM
15 years 7 months ago
Supporting Knowledge Workers Beyond the Desktop With Palplates
Palplates are a collection of touch-screen terminals placed around the office enabling human-computer interactions at the point of need. Supporting a community of mobile authentic...
Jennifer Mankoff, Bill N. Schilit
139
Voted
BIRTHDAY
1997
Springer
15 years 7 months ago
Expressive Power of Unary Counters
We compare the expressive power on finite models of two extensions of first order logic L with equality. L(Ct) is formed by adding an operator count{x : ϕ}, which builds a term ...
Michael Benedikt, H. Jerome Keisler
123
Voted
SPDP
1993
IEEE
15 years 7 months ago
The Meerkat Multicomputer
Meerkat is a distributed memory multicomputer architecture that scales to hundreds of processors. Meerkat uses a two dimensional passive backplane to connect nodes composed of pro...
Robert C. Bedichek, Curtis Brown
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
15 years 7 months ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...