Sciweavers

1575 search results - page 246 / 315
» The provenance of electronic data
Sort
View
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
14 years 11 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
ICML
2002
IEEE
14 years 10 months ago
IEMS - The Intelligent Email Sorter
Classification of email is an important everyday task for a large and growing number of users. This paper describes the machine learning approaches underlying the i-ems (Intellige...
Elisabeth Crawford, Judy Kay, Eric McCreath
WWW
2004
ACM
14 years 10 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
CHI
2007
ACM
14 years 10 months ago
Comparing physical, automatic and manual map rotation for pedestrian navigation
It is well-established finding that people find maps easier to use when they are aligned so that "up" on the map corresponds to the user's forward direction. With m...
Will Seager, Danae Stanton Fraser
VLDB
2003
ACM
144views Database» more  VLDB 2003»
14 years 10 months ago
Business-to-business interactions: issues and enabling technologies
Business-to-Business (B2B) technologies pre-date the Web. They have existed for at least as long as the Internet. B2B applications were among the first to take advantage of advance...
Brahim Medjahed, Boualem Benatallah, Athman Bougue...