Sciweavers

1139 search results - page 193 / 228
» Trust Management Survey
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
14 years 9 months ago
Bypass Caching: Making Scientific Databases Good Network Citizens
Scientific database federations are geographically distributed and network bound. Thus, they could benefit from proxy caching. However, existing caching techniques are not suitabl...
Tanu Malik, Randal C. Burns, Amitabh Chaudhary
PODS
2009
ACM
130views Database» more  PODS 2009»
14 years 8 months ago
The finite model theory toolbox of a database theoretician
For many years, finite model theory was viewed as the backbone of database theory, and database theory in turn supplied finite model theory with key motivations and problems. By n...
Leonid Libkin
MOBISYS
2005
ACM
14 years 7 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
HICSS
2010
IEEE
235views Biometrics» more  HICSS 2010»
14 years 2 months ago
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
Alexandra Durcikova, Kelly J. Fadel