Sciweavers

IH
1998
Springer
14 years 3 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
COOPIS
1997
IEEE
14 years 3 months ago
Query Modification in Object-Oriented Database Federations
W e discuss the modification of queries against an integrated view in a federation of object-oriented databases. W epresent a generalisation of existing algorithms for simple glob...
Mark W. W. Vermeer, Peter M. G. Apers
COOPIS
1997
IEEE
14 years 3 months ago
An Ontology Tool for Query Formulation in an Agent-Based Context
This paper describes how query formulation can be made simple and less complicated by using ontologies. It takes a brief look at several advantages of using ontologies in a distri...
Kuhanandha Mahalingam, Michael N. Huhns
COOPIS
1997
IEEE
14 years 3 months ago
Cooperative View Mechanisms in Distributed Multiuser Hypermedia Environments
Distributed multiuser hypermedia environments provide not only information sharing mechanisms but also user collaboration/ communication facilities. The provision of integrated vi...
Shin'ichi Konomi, Yusuke Yokota, Kazuhiro Sakata, ...
COOPIS
1997
IEEE
14 years 3 months ago
Task Sharing among Agents using Reactive Rules
Coordination and collaboration are naturally used by groups for carrying out activities and solving problems that require cooperation. However, getting a set of computer agents to...
Mikael Berndtsson, Sharma Chakravarthy, Brian Ling...
COOPIS
1997
IEEE
14 years 3 months ago
A Distributed Execution Environment for Large-Scale Workflow Management Systems with Subnets and Server Migration
If the number of users within a workjlow management system (WFMS) increases, a central workflow server (WFserver) and a single local area network (LAN) may become overloaded. The ...
Thomas Bauer, Peter Dadam
COOPIS
1997
IEEE
14 years 3 months ago
Semi-Automatic Wrapper Generation for Internet Information Sources
To simplify the task of obtaining information from the vast number of information sources that are available on the World Wide Web (WWW), we are building tools to build informatio...
Naveen Ashish, Craig A. Knoblock
SIGUCCS
1998
ACM
14 years 3 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
SIGUCCS
1998
ACM
14 years 3 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
SIGIR
1998
ACM
14 years 3 months ago
How Reliable Are the Results of Large-Scale Information Retrieval Experiments?
Two stages in measurement of techniques for information retrieval are gathering of documents for relevance assessment and use of the assessments to numerically evaluate effective...
Justin Zobel