Sciweavers

15644 search results - page 3032 / 3129
» Brittle System Analysis
Sort
View
SIGIR
2004
ACM
14 years 1 months ago
A search engine for historical manuscript images
Many museum and library archives are digitizing their large collections of handwritten historical manuscripts to enable public access to them. These collections are only available...
Toni M. Rath, R. Manmatha, Victor Lavrenko
SIGIR
2004
ACM
14 years 1 months ago
Resource selection for domain-specific cross-lingual IR
An under-explored question in cross-language information retrieval (CLIR) is to what degree the performance of CLIR methods depends on the availability of high-quality translation...
Monica Rogati, Yiming Yang
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
EGOV
2004
Springer
14 years 1 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
« Prev « First page 3032 / 3129 Last » Next »