Sciweavers

826 search results - page 96 / 166
» The Modernization of a Call Center
Sort
View
IJACT
2008
83views more  IJACT 2008»
13 years 8 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
IVC
2002
106views more  IVC 2002»
13 years 7 months ago
Interactive visual dialog
In this paper we propose a paradigm called the Interactive Visual Dialog (IVD) as a means of facilitating a system's ability to recognize objects presented to it by a human. ...
Tal Arbel, Frank P. Ferrie
KES
2010
Springer
13 years 6 months ago
Talking Biology in Logic, and Back
While computation of biological information takes center stage in today’s research, knowledge-based query processing in biological databases has not gained much attention. The co...
Hasan Jamil
MANSCI
2010
76views more  MANSCI 2010»
13 years 6 months ago
Navel Gazing: Academic Inbreeding and Scientific Productivity
The practice of having PhDs employed by the university that trained them, commonly called "academic inbreeding," has long been assumed to have a damaging effect on schol...
Hugo Horta, Francisco M. Veloso, Rócio Gred...
IOT
2010
13 years 6 months ago
A resource oriented architecture for the Web of Things
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Dominique Guinard, Vlad Trifa, Erik Wilde