Sciweavers

3591 search results - page 707 / 719
» Typing linear constraints
Sort
View
CIKM
2008
Springer
14 years 11 days ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
CLEF
2008
Springer
14 years 5 days ago
Cheshire at GeoCLEF 2008: Text and Fusion Approaches for GIR
In this paper we will briefly describe the approaches taken by Berkeley for the main GeoCLEF 2008 tasks (Mono and Bilingual retrieval). The approach this year used probabilistic t...
Ray R. Larson
RIVF
2007
13 years 11 months ago
Thai Speech Keyword Spotting using Heterogeneous Acoustic Modeling
This paper illustrates the use of acoustic modeling of spoken dialog systems. One major problem with using speech three different structures, including syllables, fillers and recog...
S. Tangruamsub, Proadpran Punyabukkana, Atiwong Su...
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 11 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
PDCN
2004
13 years 11 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen