The need for Natural Language Interfaces to databases (NLIs) has become increasingly acute as more and more people access information through their web browsers, PDAs, and cell ph...
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Geovisualization has traditionally played a critical role in analysis and decision-making, but recent developments have also brought a revolution in widespread online access to ge...
David C. Wilson, Heather Richter Lipford, Erin Car...