Sciweavers

8301 search results - page 1574 / 1661
» Risk-Aware Information Retrieval
Sort
View
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DATESO
2009
119views Database» more  DATESO 2009»
13 years 6 months ago
Efficiency Improvement of Narrow Range Query Processing in R-tree
Indexing methods for efficient processing of multidimensional data are very requested in many fields, like geographical information systems, drawing documentations etc. Well-known ...
Peter Chovanec, Michal Krátký
DLOG
2009
13 years 6 months ago
OWL Reasoning in the Real World: Searching for Godot
I will provide an overview of many of the use cases that we looked at to apply OWL ABox reasoning in the real world. The fields we covered included (a) healthcare, and life science...
Kavitha Srinivas
FIS
2009
13 years 6 months ago
Semantic Advertising for Web 3.0
Abstract. Advertising on the World Wide Web is based around automatically matching web pages with appropriate advertisements, in the form of banner ads, interactive adverts, or tex...
Edward Thomas, Jeff Z. Pan, Stuart Taylor, Yuan Re...
FQAS
2009
Springer
113views Database» more  FQAS 2009»
13 years 6 months ago
On Reaching Consensus by a Group of Collaborating Agents
In this paper, an agent is defined as a triple (S, RS, LS), where S is a multi-hierarchical decision system, RS is a set of rules extracted from S defining values of its decision a...
Zbigniew W. Ras, Agnieszka Dardzinska
« Prev « First page 1574 / 1661 Last » Next »