Sciweavers

1834 search results - page 351 / 367
» Public Key Cryptography
Sort
View
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
13 years 11 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert
VLDB
2000
ACM
155views Database» more  VLDB 2000»
13 years 11 months ago
ICICLES: Self-Tuning Samples for Approximate Query Answering
Approximate query answering systems provide very fast alternatives to OLAP systems when applications are tolerant to small errors in query answers. Current sampling-based approach...
Venkatesh Ganti, Mong-Li Lee, Raghu Ramakrishnan
USENIX
2007
13 years 10 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
ESWS
2010
Springer
13 years 9 months ago
An Unsupervised Approach for Acquiring Ontologies and RDF Data from Online Life Science Databases
In the Linked Open Data cloud one of the largest data sets, comprising of 2.5 billion triples, is derived from the Life Science domain. Yet this represents a small fraction of the ...
Saqib Mir, Steffen Staab, Isabel Rojas
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...