Sciweavers

5580 search results - page 1007 / 1116
» Meta-level Information Extraction
Sort
View
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 3 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
ESWS
2007
Springer
14 years 3 months ago
Intelligent Search in a Collection of Video Lectures
ct In recent years, the use of streamed digital video as a teaching and learning resource has become an increasingly attractive option for many educators as an innovation which exp...
Angela Fogarolli
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
14 years 3 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
IPPS
2006
IEEE
14 years 3 months ago
High-performance computing in remotely sensed hyperspectral imaging: the Pixel Purity Index algorithm as a case study
The incorporation of last-generation sensors to airborne and satellite platforms is currently producing a nearly continual stream of high-dimensional data, and this explosion in t...
Antonio Plaza, David Valencia, Javier Plaza
« Prev « First page 1007 / 1116 Last » Next »