Sciweavers

3474 search results - page 613 / 695
» Data Management in RFID Applications
Sort
View
IH
2001
Springer
15 years 8 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
DOLAP
1999
ACM
15 years 8 months ago
A Dynamic Load Balancing Strategy for Parallel Datacube Computation
In recent years, OLAP technologies have become one of the important applications in the database industry. In particular, the datacube operation proposed in [5] receives strong at...
Seigo Muto, Masaru Kitsuregawa
KES
1998
Springer
15 years 8 months ago
An acquisition of the relation between vision and action using self-organizing map and reinforcement learning
An agent must acquire internal representation appropriate for its task, environment, sensors. As a learning algorithm, reinforcement learning is often utilized to acquire the rela...
Kazunori Terada, Hideaki Takeda, Toyoaki Nishida
UIST
1997
ACM
15 years 8 months ago
Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments
This paper proposes a new field of user interfaces called multi-computer direct manipulation and presents a pen-based direct manipulation technique that can be used for data trans...
Jun Rekimoto
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson