Sciweavers

1583 search results - page 259 / 317
» Issues in data stream management
Sort
View
SISW
2005
IEEE
15 years 3 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
WPES
2005
ACM
15 years 3 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
IUI
2004
ACM
15 years 3 months ago
Supporting user hypotheses in problem diagnosis
People are performing increasingly complicated actions on the web, such as automated purchases involving multiple sites. Things often go wrong, however, and it can be difficult to...
Earl J. Wagner, Henry Lieberman
CISIS
2010
IEEE
15 years 3 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 3 months ago
An ERP Maintenance Model
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Celeste See Pui Ng, Guy G. Gable, Taizan Chan