Sciweavers

1553 search results - page 89 / 311
» Democracy Functions of Information Technology
Sort
View
ISW
2007
Springer
14 years 4 months ago
Specifying Imperative Data Obfuscations
Abstract. An obfuscation aims to transform a program, without affecting the functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Clark D. Thomborson, Anirban Majumd...
DAWAK
2009
Springer
14 years 2 months ago
What Is Spatio-Temporal Data Warehousing?
Abstract. In the last years, extending OLAP (On-Line Analytical Processing) systems with spatial and temporal features has attracted the attention of of the GIS (Geographic Informa...
Alejandro A. Vaisman, Esteban Zimányi
CIKM
2008
Springer
14 years 2 days ago
Estimating the number of answers with guarantees for structured queries in p2p databases
Structured P2P overlays supporting standard database functionalities are a popular choice for building large-scale distributed data management systems. In such systems, estimating...
Marcel Karnstedt, Kai-Uwe Sattler, Michael Ha&szli...
WSC
1996
13 years 11 months ago
Controlling Activities in a Virtual Manufacturing Cell
Researchers at the National Institute of Standards and Technology are developing a virtual manufacturing cell. This cell will contain simulation models of a wide range of manufact...
Michael Iuliano, Albert Jones
WWW
2009
ACM
14 years 10 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...