Sciweavers

1467 search results - page 238 / 294
» Computing with Electronic Nanotechnologies
Sort
View
ECIR
2003
Springer
13 years 9 months ago
Query-Based Document Skimming: A User-Centred Evaluation of Relevance Profiling
We present a user-centred, task-oriented, comparative evaluation of two query-based document skimming tools. ProfileSkim bases within-document retrieval on computing a relevance pr...
David J. Harper, Ivan Koychev, Sun Yixing
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 9 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
WIESS
2000
13 years 9 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
ANLP
1994
105views more  ANLP 1994»
13 years 9 months ago
Modeling Content Identification from Document Images
A new technique to locate content-representing words for a given document image using representation of character shapes is described. A character shape code representation define...
Takehiro Nakayama