Sciweavers

6952 search results - page 1267 / 1391
» The information integrity imperative
Sort
View
DRM
2003
Springer
14 years 2 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 2 months ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai
ICWE
2003
Springer
14 years 2 months ago
Semi-automatic Assessment Process in a Ubiquitous Environment for Language Learning
This work presents a research on the methods and mechanisms necessary to bring the Information and Communication Technologies in the traditional classroom. This will be achieved by...
Maximiliano Paredes, Manuel Ortega, Pedro P. S&aac...
JCDL
2010
ACM
184views Education» more  JCDL 2010»
14 years 2 months ago
Evaluating topic models for digital libraries
Topic models could have a huge impact on improving the ways users find and discover content in digital libraries and search interfaces, through their ability to automatically lea...
David Newman, Youn Noh, Edmund M. Talley, Sarvnaz ...
PODS
2010
ACM
173views Database» more  PODS 2010»
14 years 2 months ago
Foundations of schema mapping management
In the last few years, a lot of attention has been paid to the specification and subsequent manipulation of schema mappings, a problem which is of fundamental importance in metad...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
« Prev « First page 1267 / 1391 Last » Next »