Sciweavers

270 search results - page 38 / 54
» Information intelligence: metadata for information discovery...
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 2 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
MM
2006
ACM
179views Multimedia» more  MM 2006»
14 years 1 months ago
ZooMICSS: a zoomable map image collection sensemaking system (the Katrina Rita context)
Access to devices that integrate Global Positioning data with image and sound acquisition becomes more common, enabling people to build large collections of locative multimedia. A...
Ross Graeber, Andruid Kerne, M. Kathryn Henderson
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
DKE
2008
208views more  DKE 2008»
13 years 7 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
JPDC
2011
219views more  JPDC 2011»
13 years 2 months ago
BlobSeer: Next-generation data management for large scale infrastructures
As data volumes increase at a high speed in more and more application fields of science, engineering, information services, etc., the challenges posed by data-intensive computing...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé,...