Sciweavers

2386 search results - page 238 / 478
» Database Security 2000
Sort
View
SDMW
2004
Springer
15 years 4 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 4 months ago
Handling Identity in Peer-to-Peer Systems
Due to the limited number of available IP addresses most computers on the Internet use dynamic IP addresses which causes problems for applications that have to maintain routing ta...
Manfred Hauswirth, Anwitaman Datta, Karl Aberer
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 23 days ago
A Process Improvement Approach to Improve Web Form Design and Usability
The research presented in this paper is an examination of how the concepts used in process improvement may be applied to a web form to improve design and usability. Although much ...
Sean Thompson, Torab Torabi
ANLP
1997
67views more  ANLP 1997»
15 years 9 days ago
Using SGML as a Basis for Data-Intensive NLP
This paper describes the LT NSL system (McKelvie et al, 1996), an architecture for writing corpus processing tools. This system is then compared with two other systems which addre...
David McKelvie, Chris Brew, Henry S. Thompson
ANLP
1997
103views more  ANLP 1997»
15 years 9 days ago
Natural Language in Four Spatial Interfaces
We describe our experiences building spoken language interfaces to four demonstration applications all involving 2- or 3-D spatial displays or gestural interactions: an air combat...
Kenneth Wauchope, Stephanie Everett, Dennis Perzan...