Sciweavers

497 search results - page 56 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
ECIR
2007
Springer
15 years 5 months ago
Combination of Document Priors in Web Information Retrieval
Query-independent features (also called document priors), such as the number of incoming links to a document, its Page-Rank, or the type of its associated URL, have been successfu...
Jie Peng, Iadh Ounis
IAJIT
2011
14 years 7 months ago
An RFID-based validation system for halal food
: In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the ...
Mohd Nasir, Azah Norman, Shukor Fauzi, Masliyana A...
MIAR
2006
IEEE
15 years 10 months ago
The Effect of Depth Perception on Visual-Motor Compensation in Minimal Invasive Surgery
Despite technological advances in minimally invasive surgery (MIS) in recent years, 3D visualization of the operative field still remains one of greatest challenges. In this paper,...
Marios Nicolaou, Louis Atallah, Adam James, Julian...
CLUSTER
2002
IEEE
15 years 9 months ago
Noncontiguous I/O through PVFS
With the tremendous advances in processor and memory technology, I/O has risen to become the bottleneck in high-performance computing for many applications. The development of par...
Avery Ching, Alok N. Choudhary, Wei-keng Liao, Rob...
SAFECOMP
2007
Springer
15 years 10 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...