Sciweavers

219 search results - page 24 / 44
» Requirements for Science Data Bases and SciDB
Sort
View
CSFW
2002
IEEE
15 years 4 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
ICDE
2010
IEEE
401views Database» more  ICDE 2010»
15 years 9 months ago
Continuous Query Evaluation over Distributed Sensor Networks
— In this paper1 we address the problem of processing continuous multi-join queries, over distributed data streams. Our approach makes use of existing work in the field of publi...
Oana Jurca, Sebastian Michel, Alexandre Herrmann, ...
ECIR
2009
Springer
15 years 9 months ago
Synchronous Collaborative Information Retrieval: Techniques and Evaluation
Synchronous Collaborative Information Retrieval refers to systems that support multiple users searching together at the same time in order to satisfy a shared information need. To ...
Colum Foley, Alan F. Smeaton
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 5 months ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...
CIKM
2006
Springer
15 years 3 months ago
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions
The blogosphere--the totality of blog-related Web sites-has become a great source of trend analysis in areas such as product survey, customer relationship, and marketing. Existing...
Yun Chi, Belle L. Tseng, Jun'ichi Tatemura