Sciweavers

511 search results - page 29 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
147
Voted
NBIS
2009
Springer
15 years 10 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
179
Voted
MIR
2004
ACM
242views Multimedia» more  MIR 2004»
15 years 9 months ago
Content based access for a massive database of human observation video
We present in this paper a CBIR system for use in a psychological study of the relationship between human movement and Dyslexia. The system allows access to up to 500 hours of vid...
Laurent Joyeux, Erika Doyle, Hugh Denman, Andrew C...
154
Voted
DLOG
2003
15 years 5 months ago
Incremental Query Answering for Implementing Document Retrieval Services
Agent systems that search the Semantic Web are seen as killer applications for description logic (DL) inference engines. The guiding examples for the Semantic Web involve informat...
Volker Haarslev, Ralf Möller
138
Voted
ICSOC
2004
Springer
15 years 9 months ago
Hot service deployment in an ad hoc grid environment
In this paper, we present a solution to the problem of dynamically deploying grid service factories onto computing nodes running an implementation of the Open Grid Services Infras...
Thomas Friese, Matthew Smith, Bernd Freisleben
146
Voted
RECSYS
2009
ACM
15 years 8 months ago
A semantic framework for personalized ad recommendation based on advanced textual analysis
In this paper we present a hybrid recommendation system that combines ontological knowledge with content-extracted linguistic information, derived from pre-trained lexical graphs,...
Dorothea Tsatsou, Fotis Menemenis, Ioannis Kompats...