Sciweavers

2229 search results - page 311 / 446
» The Case for Grounding Databases
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 6 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
CIIT
2004
15 years 6 months ago
Transliterated arabic name search
We address name search for transliterated Arabic given names. In previous work, we addressed similar problems with English and Arabic surnames. In each previous case, we used a va...
David Holmes, Samsum Kashfi, Syed Uzair Aqeel
CSAC
2004
15 years 6 months ago
CoMex - A Mechanism for Coordination of Task Execution in Group Work
CoMex (Coordination Mechanism) is a system to coordinate the execution of tasks accessing coordinable entities. It uses coordination rules to describe the temporal and logical orde...
Hilda Tellioglu
EAI
2004
15 years 6 months ago
Integrating Product Catalogs via Multi-language Ontologies
A vertically integrated market consists of potentially competing companies who supply each other with products and services. Information technology can be employed to improve the b...
Manfred A. Jeusfeld
FLAIRS
2004
15 years 6 months ago
Automatic Generation of Background Text to Aid Classification
We illustrate that Web searches can often be utilized to generate background text for use with text classification. This is the case because there are frequently many pages on the...
Sarah Zelikovitz, Robert Hafner