Sciweavers

1407 search results - page 207 / 282
» Systems Theory Model for Information Security
Sort
View
FUIN
2008
142views more  FUIN 2008»
13 years 9 months ago
Relational Transformation-based Tagging for Activity Recognition
Abstract. The ability to recognize human activities from sensory information is essential for developing the next generation of smart devices. Many human activity recognition tasks...
Niels Landwehr, Bernd Gutmann, Ingo Thon, Luc De R...
WWW
2009
ACM
14 years 10 months ago
A densitometric analysis of web template content
What makes template content in the Web so special that we need to remove it? In this paper I present a large-scale aggregate analysis of textual Web content, corroborating statist...
Christian Kohlschütter
IWRT
2010
161views Communications» more  IWRT 2010»
13 years 7 months ago
RFID-assisted Product Delivery in Sustainable Supply Chains: A Knowledge-based Approach
The paper proposes an integrated framework which uses knowledge representation theory and languages to annotate relevant product information in a semantically rich and unambiguous ...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
SIGUCCS
2005
ACM
14 years 2 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
SIGIR
2002
ACM
13 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny