Sciweavers

7593 search results - page 1482 / 1519
» Querying XML Databases
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 4 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
SSDBM
2006
IEEE
156views Database» more  SSDBM 2006»
14 years 3 months ago
On Data and Visualization Models for Signaling Pathways
Signaling pathways are chains of interacting proteins, through which the cell converts a (usually) extracellular signal into a biological response. The number of known signaling p...
Nattakarn Ratprasartporn, Ali Cakmak, Gultekin &Ou...
MM
2005
ACM
167views Multimedia» more  MM 2005»
14 years 3 months ago
Evaluation axes for medical image retrieval systems: the imageCLEF experience
Content–based image retrieval in the medical domain is an extremely hot topic in medical imaging as it promises to help better managing the large amount of medical images being ...
Henning Müller, Paul Clough, William R. Hersh...
MDM
2005
Springer
165views Communications» more  MDM 2005»
14 years 3 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
« Prev « First page 1482 / 1519 Last » Next »