Sciweavers

8301 search results - page 1652 / 1661
» Risk-Aware Information Retrieval
Sort
View
MSWIM
2004
ACM
14 years 1 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 1 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
EWCBR
2004
Springer
14 years 1 months ago
Fault Diagnosis of Industrial Robots Using Acoustic Signals and Case-Based Reasoning
In industrial manufacturing rigorous testing is used to ensure that the delivered products meet their specifications. Mechanical maladjustment or faults often show their presence t...
Erik Olsson, Peter J. Funk, Marcus Bengtsson
CBMS
2003
IEEE
14 years 28 days ago
A National Virtual Specimen Database for Early Cancer Detection
Access to biospecimens is essential for enabling cancer biomarker discovery. The National Cancer Institute's (NCI) Early Detection Research Network (EDRN) comprises and integ...
Heather Kincaid, Sean C. Kelly, Daniel J. Crichton...
23
Voted
ITCC
2003
IEEE
14 years 27 days ago
A Learning Objects Approach to Teaching Programming
The goal of this paper is to describe a new approach to a content creation and delivery mechanism for a programming course. This approach is based on the concept of creating a lar...
Victor Adamchik, Ananda Gunawardena
« Prev « First page 1652 / 1661 Last » Next »