Sciweavers

1553 search results - page 256 / 311
» Democracy Functions of Information Technology
Sort
View
IDA
2008
Springer
15 years 5 months ago
Estimating the depth of anesthesia using fuzzy soft computation applied to EEG features
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
JDFP
2006
139views more  JDFP 2006»
15 years 5 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
CIKM
2010
Springer
15 years 4 months ago
Preference query evaluation over expensive attributes
Most database systems allow query processing over attributes that are derived at query runtime (e.g., user-defined functions and remote data calls to web services), making them e...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
AIRS
2010
Springer
15 years 3 months ago
Learning to Rank with Supplementary Data
This paper is concerned with a new task of ranking, referred to as "supplementary data assisted ranking", or "supplementary ranking" for short. Different from c...
Wenkui Ding, Tao Qin, Xu-Dong Zhang
ICISS
2010
Springer
15 years 3 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...