Sciweavers

5869 search results - page 905 / 1174
» Multilingual Information Access
Sort
View
JCDL
2009
ACM
127views Education» more  JCDL 2009»
15 years 10 months ago
Collecting fragmentary authors in a digital library
This paper discusses new work to represent, in a digital library of classical sources, authors whose works themselves are lost and who survive only where surviving authors quote, ...
Monica Berti, Matteo Romanello, Alison Babeu, Greg...
MIR
2010
ACM
234views Multimedia» more  MIR 2010»
15 years 10 months ago
ACQUINE: aesthetic quality inference engine - real-time automatic rating of photo aesthetics
We present ACQUINE - Aesthetic Quality Inference Engine, a publicly accessible system which allows users to upload their photographs and have them rated automatically for aestheti...
Ritendra Datta, James Ze Wang
CCS
2010
ACM
15 years 10 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
AINA
2008
IEEE
15 years 10 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
114
Voted
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
15 years 10 months ago
Rendezvous without coordinates
— We study minimalism in sensing and control by considering a multi-agent system in which each agent moves like a Dubins car and has a limited sensor that reports only the presen...
Jingjin Yu, Steven M. LaValle, Daniel Liberzon