Sciweavers

6770 search results - page 294 / 1354
» How GPUs Work
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 10 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
116
Voted
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
15 years 10 months ago
Systems Design, Process Performance and Economic Outcomes
IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...
ICALT
2006
IEEE
15 years 10 months ago
Integrating Learning Objects to Business Processes
The fast development of technologies requires specialized skills that need to be renewed frequently. For example, the semantic web technologies related to knowledge centric organi...
Juha Puustjärvi
TABLETOP
2006
IEEE
15 years 10 months ago
MultiSpace: Enabling Electronic Document Micro-mobility in Table-Centric, Multi-Device Environments
Although electronic media has changed how people interact with documents, today’s electronic documents and the environments in which they are used are still impoverished relativ...
Katherine Everitt, Chia Shen, Kathy Ryall, Clifton...