Sciweavers

11718 search results - page 2253 / 2344
» Testing database applications
Sort
View
ECCC
2010
98views more  ECCC 2010»
15 years 25 days ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
GIS
2010
ACM
15 years 24 days ago
Reverse k-Nearest Neighbor monitoring on mobile objects
In this paper we focus on the problem of continuously monitoring the set of Reverse k-Nearest Neighbors (RkNNs) of a query object in a moving object database using a client server...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
126
Voted
IEEECIT
2010
IEEE
15 years 23 days ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IS
2010
15 years 22 days ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
JKM
2010
131views more  JKM 2010»
15 years 21 days ago
Beyond the ba: managing enabling contexts in knowledge organizations
Purpose – Looking at the practical experience of organizations pursuing knowledge management, it is found that their efforts are primarily focused on creating the conditions and...
Chun Wei Choo, Rivadávia Correa Drummond de...
« Prev « First page 2253 / 2344 Last » Next »