Sciweavers

8512 search results - page 1556 / 1703
» Computing Theory With Relevance
Sort
View
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
PODS
2010
ACM
242views Database» more  PODS 2010»
14 years 1 months ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
SIGECOM
2010
ACM
154views ECommerce» more  SIGECOM 2010»
14 years 1 months ago
Ranking games that have competitiveness-based strategies
This paper studies —from the perspective of efficient computation— a type of competition that is widespread throughout the plant and animal kingdoms, higher education, politic...
Leslie Ann Goldberg, Paul W. Goldberg, Piotr Kryst...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
14 years 1 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
ISORC
2000
IEEE
14 years 22 days ago
Architecture, Design Methodology, and Component-Based Tools for a Real-Time Inspection System
We describe a real-time, component-based system for an inspection application. We chose the inspection application and the accompanying task (or scenario) so that we might fully e...
John Albert Horst
« Prev « First page 1556 / 1703 Last » Next »