Sciweavers

725 search results - page 90 / 145
» Overview of TREC 2007
Sort
View
COLCOM
2007
IEEE
15 years 5 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
COMPSAC
2007
IEEE
15 years 5 months ago
An Instant Messaging Framework for Flexible Interaction with Rich Clients
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to ...
Matthias Book, Volker Gruhn
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 5 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
58
Voted
ICDAR
2007
IEEE
15 years 5 months ago
New Aspects of InkML for Pen-Based Computing
As pen-based computing becomes more prevalent, it is increasingly important to be able to share ink across applications and across platforms. The emerging standard Ink Markup Lang...
Stephen M. Watt
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
15 years 5 months ago
SQL Anywhere: A Holistic Approach to Database Self-management
In this paper we present an overview of the selfmanagement features of SQL Anywhere, a full-function relational database system designed for frontline business environments with m...
Ivan T. Bowman, Peter Bumbulis, Dan Farrar, Anil K...