Sciweavers

4057 search results - page 599 / 812
» Linear combination of transformations
Sort
View
ASWC
2006
Springer
13 years 10 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
CF
2005
ACM
13 years 10 months ago
Matrix register file and extended subwords: two techniques for embedded media processors
In this paper we employ two techniques suitable for embedded media processors. The first technique, extended subwords, uses four extra bits for every byte in a media register. Th...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
DOCENG
2008
ACM
13 years 10 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
BIS
2008
114views Business» more  BIS 2008»
13 years 9 months ago
Determining Relevant Deep Web Sites by Query Context Identification
Deep web search requires a transformation between search keywords and semantically described and well-formed data structures. We approached this problem in our "In the Web of ...
Zsolt Tivadar Kardkovács, Domonkos Tikk
DICTA
2007
13 years 9 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran