Sciweavers

2514 search results - page 125 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View

Lecture Notes
5297views
16 years 11 months ago
Database-Management Principles And Applications
The Lecture notes covers database architecture, design, administration, and implementation. Evaluation and use of database-management systems for computers, with emphasis on microc...
R. E. Wyllys
CCS
2006
ACM
15 years 5 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
SCESM
2006
ACM
247views Algorithms» more  SCESM 2006»
15 years 7 months ago
Automating software architecture exploration with M2Aspects
An important step in the development of large-scale distributed reactive systems is the design of effective system architectures. The early availability of prototypes facilitates...
Ingolf H. Krüger, Gunny Lee, Michael Meisinge...
STORAGESS
2006
ACM
15 years 7 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
HT
2010
ACM
15 years 6 months ago
Of categorizers and describers: an evaluation of quantitative measures for tagging motivation
While recent research has advanced our understanding about the structure and dynamics of social tagging systems, we know little about (i) the underlying motivations for tagging (w...
Christian Körner, Roman Kern, Hans-Peter Grah...