Sciweavers

6952 search results - page 1260 / 1391
» The information integrity imperative
Sort
View
SOUPS
2006
ACM
14 years 3 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
STORAGESS
2006
ACM
14 years 3 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
BROADNETS
2005
IEEE
14 years 3 months ago
A Lightweight framework for source-to-sink data transfer in wireless sensor networks
— Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In addition, for many sensor network applications, timeliness of data deliver...
James Jobin, Zhenqiang Ye, Honomount Rawat, Srikan...
CSB
2005
IEEE
189views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Learning Yeast Gene Functions from Heterogeneous Sources of Data Using Hybrid Weighted Bayesian Networks
We developed a machine learning system for determining gene functions from heterogeneous sources of data sets using a Weighted Naive Bayesian Network (WNB). The knowledge of gene ...
Xutao Deng, Huimin Geng, Hesham H. Ali
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Polyphonic Audio Key Finding Using the Spiral Array CEG Algorithm
Key finding is an integral step in content-based music indexing and retrieval. In this paper, we present an O(n) real-time algorithm for determining key from polyphonic audio. We ...
Ching-Hua Chuan, Elaine Chew
« Prev « First page 1260 / 1391 Last » Next »