Sciweavers

12493 search results - page 2462 / 2499
» Information Access in the Web
Sort
View
DIAL
2004
IEEE
138views Image Analysis» more  DIAL 2004»
14 years 6 days ago
Retrieving Imaged Documents in Digital Libraries Based on Word Image Coding
A great number of documents are scanned and archived in the form of digital images in digital libraries, to make them available and accessible in the Internet. Information retriev...
Yue Lu, Li Zhang, Chew Lim Tan
DIAL
2004
IEEE
164views Image Analysis» more  DIAL 2004»
14 years 6 days ago
A Dynamic Feature Generation System for Automated Metadata Extraction in Preservation of Digital Materials
Obsolescence in storage media and the hardware and software for access and use can render old electronic files inaccessible and unusable. Therefore, the long-term preservation of ...
Song Mao, Jongwoo Kim, George R. Thoma
CCS
2006
ACM
14 years 6 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2006
ACM
14 years 6 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
FDL
2004
IEEE
14 years 6 days ago
Real-Time Operating System Services for Realistic SystemC Simulation Models of Embedded Systems
gn process of embedded systems moves currently towards higher levels of abstraction. As a consequence, a need arises for an early and realistic assessment of system level design d...
P. Hastono, Stephan Klaus, Sorin A. Huss
« Prev « First page 2462 / 2499 Last » Next »