Sciweavers

150 search results - page 19 / 30
» his 2004
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
15 years 9 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
CSCW
2004
ACM
15 years 3 months ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin
ETRA
2004
ACM
124views Biometrics» more  ETRA 2004»
15 years 3 months ago
Mental imagery in problem solving: an eye tracking study
Cognitive models and empirical studies of problem solving in visuo-spatial and causal domains suggest that problem solving tasks in such domains invoke cognitive processes involvi...
Daesub Yoon, N. Hari Narayanan
ITICSE
2004
ACM
15 years 3 months ago
Self-efficacy and mental models in learning to program
Learning to program is a unique experience for each student, and it is not fully understood why one person in an introductory programming course learns to program better and more ...
Vennila Ramalingam, Deborah LaBelle, Susan Wiedenb...