Sciweavers

1328 search results - page 174 / 266
» Common Knowledge
Sort
View
ICADL
2004
Springer
116views Education» more  ICADL 2004»
14 years 2 months ago
Supporting Field Study with Personalized Project Spaces in a Geographical Digital Library
Digital libraries have been rather successful in supporting learning activities by providing learners with access to information and knowledge. However, this level of support is pa...
Ee-Peng Lim, Aixin Sun, Zehua Liu, John G. Hedberg...
RSCTC
2004
Springer
164views Fuzzy Logic» more  RSCTC 2004»
14 years 2 months ago
Rough Set Methodology in Clinical Practice: Controlled Hospital Trial of the MET System
Abstract. Acute abdominal pain in childhood is a common but diagnostically challenging problem facing Emergency Department personnel. Experienced physicians use a combination of ke...
Ken Farion, Wojtek Michalowski, Roman Slowinski, S...
WISA
2004
Springer
14 years 2 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
INFOCOM
2003
IEEE
14 years 2 months ago
The Impact of Correlated Link Weights on QoS Routing
Abstract— Finding a path in a network based on multiple constraints (the MCP problem) is often referred to as QoS routing. QoS routing with constraints on multiple additive metri...
Fernando A. Kuipers, Piet Van Mieghem