Sciweavers

1092 search results - page 214 / 219
» Do summaries help
Sort
View
155
Voted
SRDS
2010
IEEE
15 years 1 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
BIRTHDAY
2009
Springer
15 years 1 months ago
Some Notes on Models and Modelling
Analytical models are a fundamental tool in the development of computer-based systems of every kind: their essential purpose is to support human understanding and reasoning in deve...
Michael Jackson
ECIR
2009
Springer
15 years 1 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
143
Voted
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
15 years 1 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
143
Voted
CVPR
2011
IEEE
14 years 11 months ago
A Large-scale Benchmark Dataset for Event Recognition in Surveillance Video
We introduce a new large-scale video dataset designed to assess the performance of diverse visual event recognition algorithms with a focus on continuous visual event recognition ...
Sangmin Oh, Anthony Hoogs, A.G.Amitha Perera, Chia...