Sciweavers

768 search results - page 70 / 154
» Comparing User and Software Information Structures for Compa...
Sort
View
131
Voted
SSDBM
1999
IEEE
135views Database» more  SSDBM 1999»
15 years 6 months ago
Query Processing in the TAMBIS Bioinformatics Source Integration System
Conducting bioinformatic analyses involves biologists in expressing requests over a range of highly heterogeneous information sources and software tools. Such activities are labor...
Norman W. Paton, Robert Stevens, Patricia G. Baker...
113
Voted
ISW
2001
Springer
15 years 7 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?â€...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
210
Voted
VLDB
2006
ACM
138views Database» more  VLDB 2006»
16 years 2 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
ICSE
2008
IEEE-ACM
16 years 3 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
98
Voted
CSCW
1992
ACM
15 years 6 months ago
Ubiquitous Audio: Capturing Spontaneous Collaboration
Although talkhtg is an integral part of collaborative activity, there has been little computer support for acquiring and accessing the contents of conversations. Our approach has ...
Debby Hindus, Chris Schmandt