Sciweavers

DOLAP
2007
ACM
14 years 3 months ago
OLAP preferences: a research agenda
Expressing preferences when querying databases is a natural way to avoid empty results and information flooding, and in general to rank results so that the user may first see the ...
Stefano Rizzi
DOLAP
2007
ACM
14 years 3 months ago
Optimal chunking of large multidimensional arrays for data warehousing
ss domain. Using this more abstract approach means that more data sources of varying types can be incorporated with less effort, and such heterogeneous data sources might be very r...
Ekow J. Otoo, Doron Rotem, Sridhar Seshadri
DIM
2007
ACM
14 years 3 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
DIM
2007
ACM
14 years 3 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
DIM
2007
ACM
14 years 3 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
DIM
2007
ACM
14 years 3 months ago
On identity assurance in the presence of federated identity management systems
Yolanta Beres, Adrian Baldwin, Marco Casassa Mont,...
DIM
2007
ACM
14 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
DIM
2007
ACM
14 years 3 months ago
Password policy simulation and analysis
Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Be...
DIM
2007
ACM
14 years 3 months ago
Certificate-less user authentication with consent
Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi
DAWAK
2007
Springer
14 years 3 months ago
An Efficient Algorithm for Identifying the Most Contributory Substring
Abstract. Detecting repeated portions of strings has important applications to many areas of study including data compression and computational biology. This paper defines and pres...
Ben Stephenson