Sciweavers

2162 search results - page 40 / 433
» E-Crime Investigative Technologies
Sort
View
ICTIR
2009
Springer
13 years 6 months ago
Specificity Aboutness in XML Retrieval
This paper presents a theoretical methodology to evaluate filters in XML retrieval. Theoretical evaluation is concerned with the formal investigation of qualitative properties of r...
Tobias Blanke, Mounia Lalmas
CASES
2006
ACM
14 years 2 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
MICRO
2008
IEEE
208views Hardware» more  MICRO 2008»
14 years 3 months ago
Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology
— As semiconductor processing techniques continue to scale down, transient faults, also known as soft errors, are increasingly becoming a reliability threat to high-performance m...
Wangyuan Zhang, Tao Li
ECIS
2000
13 years 10 months ago
Diffusion of Internet Technologies in Travel Agencies in Australia
Abstract - The Internet appears to playing a role in the restructuring of some traditional business sectors in which some organisations profit and some decline. Travel agencies are...
Craig Standing, Thandarayan Vasudavan
WIKIS
2006
ACM
14 years 2 months ago
SweetWiki: semantic web enabled technologies in Wiki
Wikis are social web sites enabling a potentially large number of participants to modify any page or create a new page using their web browser. As they grow, wikis may suffer from...
Michel Buffa, Fabien Gandon