Sciweavers

464 search results - page 88 / 93
» Identity Management for Self-Portrayal
Sort
View
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
13 years 7 months ago
A case study of retention practices at the University of Illinois at Urbana-Champaign
Computer science is seeing a decline in enrollment at all levels of education. One key strategy for reversing this decline is to improve methods of student retention. This paper, ...
Tanya L. Crenshaw, Erin W. Chambers, Heather Metca...
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
CIKM
2008
Springer
13 years 9 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
P2PKM
2004
13 years 8 months ago
Merging G-Grid P2P Systems While Preserving Their Autonomy
Peer-to-Peer (P2P) systems share and manage huge amounts of data and resources distributed across a large number of machines. In pure P2P environments the control is totally decent...
Gianluca Moro, Gabriele Monti, Aris M. Ouksel
HASKELL
2008
ACM
13 years 8 months ago
Lightweight monadic regions
We present Haskell libraries that statically ensure the safe use of resources such as file handles. We statically prevent accessing an already closed handle or forgetting to clos...
Oleg Kiselyov, Chung-chieh Shan