Sciweavers

2763 search results - page 525 / 553
» Retrieval of Ottoman documents
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 2 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
JCDL
2009
ACM
127views Education» more  JCDL 2009»
14 years 2 months ago
Collecting fragmentary authors in a digital library
This paper discusses new work to represent, in a digital library of classical sources, authors whose works themselves are lost and who survive only where surviving authors quote, ...
Monica Berti, Matteo Romanello, Alison Babeu, Greg...
SIGIR
2009
ACM
14 years 2 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
BIBE
2008
IEEE
115views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
The Mouse Resource Browser (MRB) - A near-complete registry of mouse resources
—The Mouse Resource Browser MRB (http://bioit.fleming.gr/mrb) is an easy-to-use database for searching and retrieving mouse resource information. Currently, MRB hosts a list of 2...
Michael Zouberakis, C. Chandras, John M. Hancock, ...
ICEIS
2008
IEEE
14 years 2 months ago
An Interactive Information Seeking Interface for Exploratory Search
As the Web has become a commodity, it is used for a variety of purposes and tasks that may require a great deal of cognitive efforts. However, most search engines developed for th...
Hogun Park, Sung-Hyon Myaeng, Gwan Jang, Jong-wook...