Sciweavers

2421 search results - page 447 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ECTEL
2006
Springer
14 years 1 months ago
Blended Learning Concepts - a Short Overview
This paper presents a short overview of blended learning, showing arguments for and against these concepts. Potential blended learning scenarios are described that vary depending o...
Sonja Trapp
NAR
2011
233views Computer Vision» more  NAR 2011»
13 years 22 days ago
TIARA: a database for accurate analysis of multiple personal genomes based on cross-technology
High-throughput genomic technologies have been used to explore personal human genomes for the past few years. Although the integration of technologies is important for high-accura...
Dongwan Hong, Sung-Soo Park, Young Seok Ju, Sheehy...
IWQOS
2004
Springer
14 years 3 months ago
Yaksha: a self-tuning controller for managing the performance of 3-tiered Web sites
— Managing the performance of multiple-tiered Web sites under high client loads is a critical problem with the advent of dynamic content and database-driven servers on the Intern...
Abhinav Kamra, Vishal Misra, Erich M. Nahum
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Canonical image selection from the web
The vast majority of the features used in today’s commercially deployed image search systems employ techniques that are largely indistinguishable from text-document search – t...
Yushi Jing, Shumeet Baluja, Henry A. Rowley
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 11 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...