Sciweavers

59 search results - page 4 / 12
» Scholarship
Sort
View
ERCIMDL
2007
Springer
74views Education» more  ERCIMDL 2007»
13 years 11 months ago
Named Entity Identification and Cyberinfrastructure
Well-established instruments such as authority files and a growing set of data structures such as CIDOC CRM, FRBRoo, and MODS provide the foundation for emerging, new digital servi...
Alison Babeu, David Bamman, Gregory Crane, Robert ...
CSJM
2008
38views more  CSJM 2008»
13 years 7 months ago
Evaluation of the traffic coefficient in priority queueing systems
Methodology and algorithms of evaluation of the traffic coefficient in priority queueing systems with zero and nonzero switchover times are presented. In the case of zero switchov...
Gh. Mishkoy, A. Iu. Bejan, O. Benderschi
SEE
2011
Springer
12 years 10 months ago
Broadening Ethics Teaching in Engineering: Beyond the Individualistic Approach
There is a widespread approach to the teaching of ethics to engineering students in which the exclusive focus is on engineers as individual agents and the broader context in which...
Eddie Conlon, Henk Zandvoort
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 8 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...