Sciweavers

2514 search results - page 183 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
CIKM
2009
Springer
15 years 8 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
SCAM
2007
IEEE
15 years 8 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...
WICSA
2004
15 years 3 months ago
Software Architecture for Large-Scale, Distributed, Data-Intensive Systems
The sheer amount of data produced by modern science research has created a need for the construction and understanding of "data-intensive systems", largescale, distribut...
Chris Mattmann, Daniel J. Crichton, J. Steven Hugh...
ACSAC
2009
IEEE
15 years 8 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
134
Voted
SACMAT
2010
ACM
15 years 7 days ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino