Sciweavers

1518 search results - page 255 / 304
» An Object-Oriented Framework for Developing Information Retr...
Sort
View
IJNVO
2011
47views more  IJNVO 2011»
13 years 4 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
TMC
2008
159views more  TMC 2008»
13 years 7 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
JCDL
2009
ACM
130views Education» more  JCDL 2009»
14 years 3 months ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale
ER
2007
Springer
97views Database» more  ER 2007»
14 years 3 months ago
Towards Active Conceptual Modelling for Sudden Events
There are a number of issues for information systems which are required to collect data urgently that are not well accommodated by current conceptual modelling methodologies and a...
John F. Roddick, Aaron Ceglar, Denise de Vries