Sciweavers

127 search results - page 19 / 26
» Conjunctive Query Containment under Access Limitations
Sort
View
NAR
2007
65views more  NAR 2007»
14 years 9 months ago
STRING 7 - recent developments in the integration and prediction of protein interactions
Information on protein–protein interactions is still mostly limited to a small number of model organisms, and originates from a wide variety of experimental and computational te...
Christian von Mering, Lars Juhl Jensen, Michael Ku...
EDBT
2008
ACM
95views Database» more  EDBT 2008»
15 years 9 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
88
Voted
EUROCRYPT
2010
Springer
15 years 2 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
IADIS
2004
14 years 11 months ago
Solving Crossword Puzzles via the Google API
The GoogleTM API enables software agents to query and use search results from the large collections of data available via the ever-popular Google search engine. Web searches using...
David E. Goldschmidt, Mukkai S. Krishnamoorthy
CANDT
2009
15 years 1 months ago
The conference room as a toolbox: technological and social routines in corporate meeting spaces
HCI, CSCW, and ubicomp researchers have developed new technologies and interaction techniques to support collaboration, ranging from electronic whiteboards to software supporting ...
Christopher Plaue, John T. Stasko, Mark Baloga