Sciweavers

357 search results - page 28 / 72
» Meta methods for model sharing in personal information syste...
Sort
View
DIM
2005
ACM
13 years 10 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
FGR
2008
IEEE
264views Biometrics» more  FGR 2008»
13 years 10 months ago
Large scale learning and recognition of faces in web videos
The phenomenal growth of video on the web and the increasing sparseness of meta information associated with it forces us to look for signals from the video content for search/info...
Ming Zhao 0003, Jay Yagnik, Hartwig Adam, David Ba...
HICSS
2007
IEEE
161views Biometrics» more  HICSS 2007»
14 years 3 months ago
Helping Knowledge Cross Boundaries: Using Knowledge Visualization to Support Cross-Community Sensemaking
Knowledge sharing across community boundaries has been discussed in literature as an important source of new knowledge and innovation. Different studies point out the difficulties...
Jasminko Novak
GIS
1995
ACM
14 years 11 days ago
Collaborative Spatial Decision Making with Qualitative Constraints
: Usually spatial planning problems involve a large number of decision makers with different backgrounds and interests. The process of Collaborative Spatial Decision Making (CSDM)...
Nikos I. Karacapilidis, Dimitris Papadias, Max J. ...
COR
2008
131views more  COR 2008»
13 years 7 months ago
Queueing analysis of a server node in transaction processing middleware systems
Quantitative performance modeling of complex information systems is of immense importance for designing enterprise e-business infrastructures and applications. In this paper, we p...
Wei Xiong, Tayfur Altiok