Sciweavers

469 search results - page 91 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
CCS
2008
ACM
13 years 8 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
ECTEL
2007
Springer
14 years 10 days ago
Creation of Lithuanian Digital Library of Educational Resources and Services: the Hypothesis, Contemporary Practice, and Future
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Eugenijus Kurilovas, Svetlana Kubilinskiene
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 6 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
NAR
2007
115views more  NAR 2007»
13 years 5 months ago
DroSpeGe: rapid access database for new Drosophila species genomes
The Drosophila species comparative genome database DroSpeGe (http://insects.eugenes.org/ DroSpeGe/) provides genome researchers with rapid, usable access to 12 new and old Drosoph...
Donald G. Gilbert
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
12 years 9 months ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno