Sciweavers

1766 search results - page 264 / 354
» An Analysis of Information Content Present in Protein-DNA In...
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
PCM
2005
Springer
107views Multimedia» more  PCM 2005»
14 years 2 months ago
Auto-summarization of Multimedia Meeting Records Based on Accessing Log
Abstract. Computer techniques have been leveraged to record human experiences in many public spaces, e.g. meeting rooms and classrooms. For the large amount of such records produce...
Weisheng He, Yuanchun Shi, Xin Xiao
COOPIS
2003
IEEE
14 years 2 months ago
Analysing Mailboxes of Asynchronous Communicating Components
Abstract. Asynchronous communications are prominent in distributed and mobile systems. Often consystems consider an abstract point of view with synchronous communications. However ...
Jean-Claude Royer, Michael Xu
SIGIR
2003
ACM
14 years 2 months ago
Probabilistic term variant generator for biomedical terms
This paper presents an algorithm to generate possible variants for biomedical terms. The algorithm gives each variant its generation probability representing its plausibility, whi...
Yoshimasa Tsuruoka, Jun-ichi Tsujii
IJMMS
2006
94views more  IJMMS 2006»
13 years 9 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...