Sciweavers

8301 search results - page 1587 / 1661
» Risk-Aware Information Retrieval
Sort
View
GCB
2007
Springer
134views Biometrics» more  GCB 2007»
14 years 3 months ago
An Application of Latent Topic Document Analysis to Large-Scale Proteomics Databases
Since the advent of public data repositories for proteomics data, readily accessible results from high-throughput experiments have been accumulating steadily. Several large-scale p...
Sebastian Klie, Lennart Martens, Juan Antonio Vizc...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
14 years 3 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
MM
2006
ACM
138views Multimedia» more  MM 2006»
14 years 3 months ago
VirtualTour: an online travel assistant based on high quality images
With the popularity of both travel and Web, more and more people use online travel services to facilitate their travel activities or share their travel experiences. Considering th...
Feng Jing, Lei Zhang, Wei-Ying Ma
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SASN
2006
ACM
14 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
« Prev « First page 1587 / 1661 Last » Next »