Sciweavers

4201 search results - page 791 / 841
» Our Users have Root!
Sort
View
AAAI
2008
13 years 11 months ago
Using a Geometric-Based Sketch Recognition Approach to Sketch Chinese Radicals
Unlike English, where unfamiliar words can be queried for its meaning by typing out its letters, the analogous operation in Chinese is far from trivial due to the nature of its wr...
Paul Taele, Tracy Hammond
FAST
2008
13 years 11 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
CIKM
2008
Springer
13 years 11 months ago
Feasibility of a primarily digital research library
This position paper explores the issues related to the feasibility of having a primarily digital research library support the teaching and research needs of a university. The Asia...
Geneva L. Henry, Lisa M. Spiro
DEBS
2008
ACM
13 years 11 months ago
Top-k/w publish/subscribe: finding k most relevant publications in sliding time window w
Existing content-based publish/subscribe systems are designed assuming that all matching publications are equally relevant to a subscription. As we cannot know in advance the dist...
Kresimir Pripuzic, Ivana Podnar Zarko, Karl Aberer
DIM
2008
ACM
13 years 11 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash