Sciweavers

2763 search results - page 83 / 553
» The Dangerous 'All' in Specifications
Sort
View
JSS
2008
97views more  JSS 2008»
13 years 9 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...
JSS
2006
112views more  JSS 2006»
13 years 9 months ago
Generalized comparison of graph-based ranking algorithms for publications and authors
Citation analysis helps in evaluating the impact of scientific collections (journals and conferences), publications and scholar authors. In this paper we examine known algorithms ...
Antonis Sidiropoulos, Yannis Manolopoulos
NN
2006
Springer
120views Neural Networks» more  NN 2006»
13 years 9 months ago
Computational intelligence in earth sciences and environmental applications: Issues and challenges
This paper introduces a generic theoretical framework for predictive learning, and relates it to data-driven and learning applications in earth and environmental sciences. The iss...
Vladimir Cherkassky, Vladimir M. Krasnopolsky, Dim...
PR
2008
145views more  PR 2008»
13 years 9 months ago
Gesture spotting with body-worn inertial sensors to detect user activities
We present a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors. Our method is based on a natural partitioning of cont...
Holger Junker, Oliver Amft, Paul Lukowicz, Gerhard...
IJNVO
2007
90views more  IJNVO 2007»
13 years 9 months ago
Exploring the transaction dimensions of supply chain management
It is argued that firm cooperation in supply chain management can be classified as a hybrid governance structure in a new institutional sense. Using a key informant survey, explora...
Britta Lietke, Madlen Boslau