Sciweavers

1465 search results - page 70 / 293
» Making database systems usable
Sort
View
ERSHOV
1999
Springer
14 years 3 months ago
Binding-Time Analysis in Partial Evaluation: One Size Does Not Fit All
Abstract. Existing partial evaluators usually fix the strategy for binding-time analysis. But a single strategy cannot fulfill all goals without leading to compromises regarding ...
Niels H. Christensen, Robert Glück, Sø...
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 4 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
IEEEIAS
2009
IEEE
13 years 8 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
CBMS
2002
IEEE
14 years 3 months ago
Content-Based and Metadata Retrieval in Medical Image Database
The need for systems that can stock, represent, and provide efficient retrieval facilities of images of particular interest is becoming very high in medicine. In this respect, a l...
Solomon Atnafu, Richard Chbeir, Lionel Brunie
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
14 years 11 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...