Sciweavers

25 search results - page 5 / 5
» Preserving State Government Web Publications - First-Year Ex...
Sort
View
WWW
2007
ACM
14 years 6 months ago
The largest scholarly semantic network...ever
Scholarly entities, such as articles, journals, authors and institutions, are now mostly ranked according to expert opinion and citation data. The Andrew W. Mellon Foundation fund...
Johan Bollen, Marko A. Rodriguez, Herbert Van de S...
PODS
2003
ACM
158views Database» more  PODS 2003»
14 years 5 months ago
Computing full disjunctions
Full disjunctions are an associative extension of the outerjoin operator to an arbitrary number of relations. Their main advantage is the ability to maximally combine data from di...
Yaron Kanza, Yehoshua Sagiv
TELSYS
2010
154views more  TELSYS 2010»
13 years 5 hour ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
DSS
2007
226views more  DSS 2007»
13 years 5 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
SIBGRAPI
2009
IEEE
14 years 19 hour ago
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
—The strategies for the preservation of historical documents can include their digitization, which is an effective way to make them publicly available while preventing degradatio...
Natalia C. Batista, Ana Paula Brandão Lopes...