Sciweavers

2715 search results - page 84 / 543
» Database Publication Practices
Sort
View
37
Voted
KDD
2012
ACM
222views Data Mining» more  KDD 2012»
11 years 10 months ago
Rise and fall patterns of information diffusion: model and implications
The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of ...
Yasuko Matsubara, Yasushi Sakurai, B. Aditya Praka...
HICSS
2007
IEEE
157views Biometrics» more  HICSS 2007»
14 years 2 months ago
E-Government Evaluation: Reflections On Three Organisational Case Studies
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
Stephen Jones, Zahir Irani, Amir M. Sharif
DEXA
1998
Springer
119views Database» more  DEXA 1998»
14 years 5 days ago
Building Consistent Sample Databases to Support Information System Evolution and Migration
Prototype databases are needed in any information system development process to support data-intensive applications development. It is common practice to populate these databases u...
Jesus Bisbal, Bing Wu, Deirdre Lawless, Jane Grims...
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 10 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo