Sciweavers

362 search results - page 66 / 73
» Exploiting Geographical Location Information of Web Pages
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 3 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
GFKL
2007
Springer
152views Data Mining» more  GFKL 2007»
14 years 2 months ago
Supporting Web-based Address Extraction with Unsupervised Tagging
Abstract. The manual acquisition and modeling of tourist information as e.g. addresses of points of interest is time and, therefore, cost intensive. Furthermore, the encoded inform...
Berenike Loos, Chris Biemann
WWW
2011
ACM
13 years 2 months ago
Low-infrastructure methods to improve internet access for mobile users in emerging regions
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Sibren Isaacman, Margaret Martonosi
ADMA
2006
Springer
143views Data Mining» more  ADMA 2006»
13 years 11 months ago
Robust Collective Classification with Contextual Dependency Network Models
Abstract. In order to exploit the dependencies in relational data to improve predictions, relational classification models often need to make simultaneous statistical judgments abo...
YongHong Tian, Tiejun Huang, Wen Gao