The issues of schema evolution and temporal object models are generally considered to be orthogonal and are handled independently. However, to properly model applications that nee...
Iqbal A. Goralwalla, Duane Szafron, M. Tamer Ö...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
The aim of an information retrieval system is to nd relevant documents, thus relevance is a (if not `the') central concept of information retrieval. Notwithstanding its impor...
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. Only a designated group manager is able to iden...
This paper describes our use of a 1970's era PDP-11/10 to support an hour long module which we have incorporated into our computer organization course for the past few semest...