Sciweavers

2386 search results - page 257 / 478
» Database Security 2000
Sort
View
ISIWI
2000
15 years 12 days ago
Aiding Web Searches by Statistical Classification Tools
We describe an infrastructure for the collection and management of large amounts of text, and discuss the possibility of information extraction and visualisation from text corpora...
Gerhard Heyer, Uwe Quasthoff, Christian Wolff
84
Voted
PAKM
2000
15 years 11 days ago
Providing Informational Support for Argumentation: The ISA Project
This paper briefly presents the ISA project that addresses the issue of how argumentation processes can be supported by providing textual information from document databases. The ...
Fahri Yetim
PDPTA
2000
15 years 11 days ago
Using Enterprise JavaBeans in a Computer Science Curriculum
This paper introduces the principles behind Enterprise JavaBeans including examples of both session and entity beans. It also discusses techniques for incorporating Enterprise Jav...
Rodney S. Tosten, Jeannie R. Albrecht, Christyann ...
ACSAC
2009
IEEE
15 years 5 months ago
The Design of a Trustworthy Voting System
– After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic votin...
Nathanael Paul, Andrew S. Tanenbaum
ACSAC
2000
IEEE
15 years 3 months ago
A Reliable, Scalable General-Purpose Certificate Store
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...
Peter Gutmann