Sciweavers

929 search results - page 98 / 186
» Personal information management with SEMEX
Sort
View
ICDT
2012
ACM
251views Database» more  ICDT 2012»
11 years 11 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
WPES
2004
ACM
14 years 2 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
CIKM
2006
Springer
14 years 21 days ago
Mining blog stories using community-based and temporal clustering
In recent years, weblogs, or blogs for short, have become an important form of online content. The personal nature of blogs, online interactions between bloggers, and the temporal...
Arun Qamra, Belle L. Tseng, Edward Y. Chang
CHI
2005
ACM
13 years 11 months ago
Relescope: an experiment in accelerating relationships
Busy academics and professionals are being called upon to manage more and more relationships. Many details of collaboration are accessible in digital libraries and other repositor...
Stephen Farrell, Christopher S. Campbell, Suvda My...
DIM
2008
ACM
13 years 10 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura