Sciweavers

497 search results - page 52 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
SPIRE
2007
Springer
15 years 10 months ago
Highly Frequent Terms and Sentence Retrieval
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...
David E. Losada, Ronald T. Fernández
135
Voted
AIRS
2005
Springer
15 years 10 months ago
MPEG-7 Visual-Temporal Clustering for Digital Image Collections
We present a novel, yet simple algorithm for clustering large collections of digital images. The method is applicable to consumer digital photo libraries, where it can be used to o...
Robert O'Callaghan, Miroslaw Bober
EMISA
2009
Springer
15 years 11 months ago
A Survival Analysis of Application Life Spans based on Enterprise Architecture Models
Abstract: Modern enterprises face the challenge to survive in an ever changing environment. One commonly accepted means to address this challenge and further enhance survivability ...
Stephan Aier, Sabine Buckl, Ulrik Franke, Bettina ...
IDTRUST
2009
ACM
15 years 11 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
128
Voted
ACSAC
1999
IEEE
15 years 8 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung