Sciweavers

4013 search results - page 707 / 803
» Supporting Database Applications as a Service
Sort
View
140
Voted
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
15 years 9 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
SAC
2010
ACM
15 years 9 months ago
A semantic web-based approach for personalizing news
Hermes is an ontology-based framework for building news personalization services. This framework consists of a news classification phase, which classifies the news, a knowledge ...
Kim Schouten, Philip Ruijgrok, Jethro Borsje, Flav...
HICSS
2003
IEEE
250views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
Robert Winter, Bernhard Strauch
ISCC
2003
IEEE
15 years 9 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
181
Voted
NDSS
2003
IEEE
15 years 9 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet