Sciweavers

1818 search results - page 359 / 364
» How users use access control
Sort
View
ICCS
2005
Springer
14 years 1 months ago
Games of Inquiry for Collaborative Concept Structuring
Google’s project to digitize five of the world's greatest libraries will dramatically extend their search engine reach in the future. Current search-engine philosophy, which...
Mary A. Keeler, Heather D. Pfeiffer
ELPUB
1998
ACM
13 years 12 months ago
Towards an Information-Rich Society? Or an Information-Overloaded One? (Is the Media Becoming More Important Than the Message?)
The rapid growth in all forms of electronic publishing is creating many new problems – both technical and socio-economic. This paper examines some of these from three different ...
T. M. R. Ellis
CONEXT
2005
ACM
13 years 9 months ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida
USITS
2001
13 years 9 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
NAR
2011
248views Computer Vision» more  NAR 2011»
12 years 10 months ago
NCBI GEO: archive for functional genomics data sets - 10 years on
A decade ago, the Gene Expression Omnibus (GEO) database was established at the National Center for Biotechnology Information (NCBI). The original objective of GEO was to serve as...
Tanya Barrett, Dennis B. Troup, Stephen E. Wilhite...