Sciweavers

1928 search results - page 342 / 386
» XML with incomplete information
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 4 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
JCDL
2009
ACM
127views Education» more  JCDL 2009»
14 years 4 months ago
Collecting fragmentary authors in a digital library
This paper discusses new work to represent, in a digital library of classical sources, authors whose works themselves are lost and who survive only where surviving authors quote, ...
Monica Berti, Matteo Romanello, Alison Babeu, Greg...
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
14 years 4 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
14 years 4 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
ESCIENCE
2007
IEEE
14 years 4 months ago
Binary Data Transfer Performance over High-Latency Networks Using Web Service Attachments
One of the objectives of e-Research is to help scientists to accomplish their research, including scientific experiments, more effectively and efficiently. Web services provide ...
Donglai Zhang, Paul D. Coddington, Andrew L. Wende...