Sciweavers

6465 search results - page 1112 / 1293
» On the Evaluation of Quality of Context
Sort
View
EUROPAR
2009
Springer
13 years 6 months ago
A Least-Resistance Path in Reasoning about Unstructured Overlay Networks
Unstructured overlay networks for peer-to-peer applications combined with stochastic algorithms for clustering and resource location are attractive due to low-maintenance costs and...
Giorgos Georgiadis, Marina Papatriantafilou
EUROPKI
2009
Springer
13 years 6 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
HCI
2009
13 years 6 months ago
Ensemble SWLDA Classifiers for the P300 Speller
Abstract. The P300 Speller has proven to be an effective paradigm for braincomputer interface (BCI) communication. Using this paradigm, studies have shown that a simple linear clas...
Garett D. Johnson, Dean J. Krusienski
HCI
2009
13 years 6 months ago
User Centered Design of a Learning Object Repository
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
Núria Ferran, Ana-Elena Guerrero-Rold&aacut...
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 6 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
« Prev « First page 1112 / 1293 Last » Next »