Sciweavers

1196 search results - page 202 / 240
» Performance Measures of Dynamic Spectrum Access Networks
Sort
View
148
Voted
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 10 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
116
Voted
ICDAR
2003
IEEE
15 years 9 months ago
Features for Word Spotting in Historical Manuscripts
For the transition from traditional to digital libraries, the large number of handwritten manuscripts that exist pose a great challenge. Easy access to such collections requires a...
Toni M. Rath, R. Manmatha
141
Voted
ERCIMDL
2007
Springer
114views Education» more  ERCIMDL 2007»
15 years 7 months ago
Key Element-Context Model: An Approach to Efficient Web Metadata Maintenance
In this paper, we study the problem of maintaining metadata for open Web content. In digital libraries such as DLESE, NSDL and G-Portal, metadata records are created for some good ...
Ba-Quy Vuong, Ee-Peng Lim, Aixin Sun, Chew-Hung Ch...
122
Voted
IADIS
2003
15 years 5 months ago
Application of Metadata and Replication Mechanisms in Industrial Databases
Power transformers' failures carry great costs to electric companies since they need resources to recover from them and to perform periodical maintenance. To avoid this probl...
Perfecto Mariño, César A. Sigüe...
144
Voted
CCS
2005
ACM
15 years 9 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash