Sciweavers

673 search results - page 132 / 135
» Who's asking for help
Sort
View
JCP
2007
121views more  JCP 2007»
13 years 9 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
BMCBI
2004
110views more  BMCBI 2004»
13 years 9 months ago
Tools for loading MEDLINE into a local relational database
Background: Researchers who use MEDLINE for text mining, information extraction, or natural language processing may benefit from having a copy of MEDLINE that they can manage loca...
Diane E. Oliver, Gaurav Bhalotia, Ariel S. Schwart...
CCR
2002
113views more  CCR 2002»
13 years 9 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
EATCS
2002
62views more  EATCS 2002»
13 years 9 months ago
Crossing the Bridge at Night
We solve the general case of the bridge-crossing puzzle. 1 The Puzzle Four people begin on the same side of a bridge. You must help them across to the other side. It is night. The...
Günter Rote
PVLDB
2010
191views more  PVLDB 2010»
13 years 8 months ago
SnipSuggest: Context-Aware Autocompletion for SQL
In this paper, we present SnipSuggest, a system that provides onthe-go, context-aware assistance in the SQL composition process. SnipSuggest aims to help the increasing population...
Nodira Khoussainova, YongChul Kwon, Magdalena Bala...