Sciweavers

75 search results - page 15 / 15
» Assisted Proof Document Authoring
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 9 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
ICCBR
2001
Springer
13 years 10 months ago
Case-Based Reasoning in the Care of Alzheimer's Disease Patients
Abstract. Planning the ongoing care of Alzheimer's Disease (AD) patients is a complex task, marked by cases that change over time, multiple perspectives, and ethical issues. G...
Cynthia R. Marling, Peter Whitehouse
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
JASIS
2006
164views more  JASIS 2006»
13 years 5 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
DCG
2008
118views more  DCG 2008»
13 years 5 months ago
General-Dimensional Constrained Delaunay and Constrained Regular Triangulations, I: Combinatorial Properties
Two-dimensional constrained Delaunay triangulations are geometric structures that are popular for interpolation and mesh generation because they respect the shapes of planar domai...
Jonathan Richard Shewchuk