Sciweavers

15781 search results - page 2999 / 3157
» Evaluating Information Extraction
Sort
View
CCR
2002
113views more  CCR 2002»
15 years 3 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
CSCW
2002
ACM
15 years 3 months ago
A Descriptive Framework of Workspace Awareness for Real-Time Groupware
Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information availa...
Carl Gutwin, Saul Greenberg
IDA
2002
Springer
15 years 3 months ago
Evolutionary model selection in unsupervised learning
Feature subset selection is important not only for the insight gained from determining relevant modeling variables but also for the improved understandability, scalability, and pos...
YongSeog Kim, W. Nick Street, Filippo Menczer
JECR
2002
120views more  JECR 2002»
15 years 3 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
154
Voted
VLDB
2002
ACM
97views Database» more  VLDB 2002»
15 years 3 months ago
Structural Function Inlining Technique for Structurally Recursive XML Queries
Structurally recursive XML queries are an important query class that follows the structure of XML data. At present, it is difficult for XQuery to type and optimize structurally re...
Chang-Won Park, Jun-Ki Min, Chin-Wan Chung
« Prev « First page 2999 / 3157 Last » Next »