Sciweavers

859 search results - page 122 / 172
» The Changing Face of Cryptography
Sort
View
SIGSOFT
2008
ACM
16 years 17 days ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
KDD
2004
ACM
195views Data Mining» more  KDD 2004»
16 years 7 days ago
Improved robustness of signature-based near-replica detection via lexicon randomization
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
CHI
2007
ACM
16 years 7 days ago
Mobile kits and laptop trays: managing multiple devices in mobile information work
A study at a large IT company shows that mobile information workers frequently migrate work across devices (here: smartphones, desktop PCs, laptops). While having multiple devices...
Antti Oulasvirta, Lauri Sumari
SIGMOD
2007
ACM
123views Database» more  SIGMOD 2007»
15 years 12 months ago
Schema advisor for hybrid relational-XML DBMS
In response to the widespread use of the XML format for document representation and message exchange, major database vendors support XML in terms of persistence, querying and inde...
Mirella Moura Moro, Lipyeow Lim, Yuan-Chi Chang
SIGMOD
2003
ACM
160views Database» more  SIGMOD 2003»
15 years 12 months ago
Scientific Data Repositories: Designing for a Moving Target
Managing scientific data warehouses requires constant adaptations to cope with changes in processing algorithms, computing environments, database schemas, and usage patterns. We h...
Etzard Stolte, Christoph von Praun, Gustavo Alonso...