Sciweavers

5089 search results - page 984 / 1018
» Attention
Sort
View
CIKM
2010
Springer
13 years 6 months ago
On the selectivity of multidimensional routing indices
Recently, the problem of efficiently supporting advanced query operators, such as nearest neighbor or range queries, over multidimensional data in widely distributed environments...
Christos Doulkeridis, Akrivi Vlachou, Kjetil N&osl...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 6 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
EKAW
2010
Springer
13 years 6 months ago
Using Semantic Web Resources for Data Quality Management
The quality of data is a critical factor for all kinds of decision-making and transaction processing. While there has been a lot of research on data quality in the past two decades...
Christian Fürber, Martin Hepp
ESWA
2010
109views more  ESWA 2010»
13 years 6 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi