Sciweavers

1744 search results - page 321 / 349
» The Steganographic File System
Sort
View
126
Voted
SEMWEB
2004
Springer
15 years 9 months ago
Towards a Symptom Ontology for Semantic Web Applications
As the use of Semantic Web ontologies continues to expand there is a growing need for tools that can validate ontological consistency and provide guidance in the correction of dete...
Kenneth Baclawski, Christopher J. Matheus, Mieczys...
141
Voted
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
15 years 9 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
141
Voted
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
15 years 8 months ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant
137
Voted
CG
2000
Springer
15 years 8 months ago
Chess Neighborhoods, Function Combination, and Reinforcement Learning
Abstract. Over the years, various research projects have attempted to develop a chess program that learns to play well given little prior knowledge beyond the rules of the game. Ea...
Robert Levinson, Ryan Weber
216
Voted
ASPLOS
1998
ACM
15 years 7 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...