Sciweavers

117 search results - page 3 / 24
» Computational complexity and information asymmetry in financ...
Sort
View
WWW
2009
ACM
14 years 8 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
SIGUCCS
2000
ACM
13 years 11 months ago
Supporting PeopleSoft in an Academic Environment: Pitbull or Poodle?
Over the past decade, distributed computing necessitated a centralized support environment at most colleges and universities. This development has given campus computer users the ...
Jen Whiting, Gary Eshbaugh
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
GROUP
2007
ACM
13 years 11 months ago
The story of a working workflow management system
This work presents experiences with the adopting of a workflow management system in a large financial institution. We describe the gradual evolution of a traditional work process,...
Steen Brahe, Kjeld Schmidt