Sciweavers

469 search results - page 73 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
ELPUB
1998
ACM
13 years 12 months ago
The Library in the Card: Results from Decomate Project and Current Developments at UAB
The Library in the card is the slogan which would summarize the aims of the Univeritat Autonoma de Barcelona (UAB) Library Service in its involvement in several EC Libraries Progr...
Nuria Gallart
MSR
2006
ACM
14 years 1 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
WWW
2002
ACM
14 years 8 months ago
A pragmatic application of the semantic web using SemTalk
The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing web pages. Using common ontologies, human users sketch out the mos...
Christian Fillies, Gay Wood-Albrecht, Frauke Weich...
CVPR
2010
IEEE
14 years 2 months ago
Finding Nemo: Deformable Object Class Modelling using Curve Matching
An image search for “clownfish” yields many photos of clownfish, each of a different individual of a different 3D shape in a different pose. Yet, to the human observer, this...
Mukta Prasad, Andrew Fitzgibbon
CORR
2011
Springer
140views Education» more  CORR 2011»
12 years 11 months ago
A Wiki for Business Rules in Open Vocabulary, Executable English
The problem of business-IT alignment is of widespread economic concern. As one way of addressing the problem, this paper describes an online system that functions as a kind of Wik...
Adrian Walker