Sciweavers

2259 search results - page 385 / 452
» Separation and information hiding
Sort
View
EJIS
2010
112views more  EJIS 2010»
13 years 10 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
DC
2007
13 years 10 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel
SIGIR
2008
ACM
13 years 10 months ago
A unified and discriminative model for query refinement
This paper addresses the issue of query refinement, which involves reformulating ill-formed search queries in order to enhance relevance of search results. Query refinement typica...
Jiafeng Guo, Gu Xu, Hang Li, Xueqi Cheng
DEBU
1999
109views more  DEBU 1999»
13 years 9 months ago
Data Management for XML: Research Directions
This paper is a July 1999 snapshot of a "whitepaper" that I've been working on. The purpose of the whitepaper, which I initially drafted in April 1999, was to formu...
Jennifer Widom
MACOM
2010
13 years 4 months ago
On the Performance of Single LDGM Codes for Iterative Data Fusion over the Multiple Access Channel
One of the applications of wireless sensor networks currently undergoing active research focuses on the scenario where the information generated by a data source S is simultaneousl...
Javier Del Ser, Javier Garcia-Frias, Pedro M. Cres...