Sciweavers

628 search results - page 122 / 126
» Information Retrieval Based on Context Distance and Morpholo...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
INFOCOM
2012
IEEE
11 years 10 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
14 years 23 days ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...
ICCV
1995
IEEE
13 years 11 months ago
Closed-World Tracking
A new approach to tracking weakly modeled objects in a semantically rich domain is presented. We define a closed-world as a space-time region of an image sequence in which the co...
Stephen S. Intille, Aaron F. Bobick
JCDL
2005
ACM
152views Education» more  JCDL 2005»
14 years 1 months ago
In the company of readers: the digital library book as "practiced place"
Most digital libraries (DLs) necessarily focus on the complex issues that arise when library collections are freed from their physical anchors in buildings and on paper. Typical i...
Nancy Kaplan, Yoram Chisik