Sciweavers

717 search results - page 120 / 144
» Establishing relationships for designing rural information s...
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
15 years 11 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
CSE
2009
IEEE
15 years 5 months ago
Modeling User Perception of Interaction Opportunities for Effective Teamwork
—This paper presents a model of collaborative decision-making for groups that involve people and computer agents. The model distinguishes between actions relating to participants...
Ece Kamar, Ya'akov Gal, Barbara J. Grosz
92
Voted
WS
2005
ACM
15 years 4 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
WETICE
2000
IEEE
15 years 3 months ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
DBPL
1997
Springer
94views Database» more  DBPL 1997»
15 years 3 months ago
Querying Multidimensional Databases
Abstract. Multidimensional databases are large collections of data, often historical, used for sophisticated analysis oriented to decision making. This activity is supported by an ...
Luca Cabibbo, Riccardo Torlone