Sciweavers

1830 search results - page 334 / 366
» Implementing a Tamper-Evident Database System
Sort
View
88
Voted
ICPR
2004
IEEE
16 years 1 months ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
83
Voted
WWW
2008
ACM
16 years 1 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
84
Voted
WWW
2003
ACM
16 years 1 months ago
On labeling schemes for the semantic web
This paper focuses on the optimization of the navigation through voluminous subsumption hierarchies of topics employed by Portal Catalogs like Netscape Open Directory (ODP). We ad...
Vassilis Christophides, Dimitris Plexousakis, Mich...
65
Voted
CHI
2008
ACM
16 years 29 days ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
122
Voted
SAC
2010
ACM
15 years 7 months ago
Inductive reasoning and semantic web search
Extensive research activities are recently directed towards the Semantic Web as a future form of the Web. Consequently, Web search as the key technology of the Web is evolving tow...
Claudia d'Amato, Floriana Esposito, Nicola Fanizzi...