Sciweavers

10577 search results - page 1971 / 2116
» Active Data Mining
Sort
View
AISM
2004
15 years 6 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
ACSW
2006
15 years 6 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
ECIS
2004
15 years 6 months ago
Information system and information infrastructure deployment: the challenge of the Italian e-justice approach
Information systems development methodologies are still mainly concerned with the research of better ways to provide technical solutions for given organizational problems. The pap...
Francesco Contini, Antonio Cordella
EGITALY
2006
15 years 6 months ago
3D CT Segmentation for Clinical Evaluation of Knee Prosthesis Operations
In surgical knee replacement, the damaged knee joint is replaced with artificial prostheses. An accurate clinical evaluation must be carried out before applying knee prostheses to...
Sebastiano Battiato, Camillo Bosco, Giovanni Maria...
194
Voted
FLAIRS
2006
15 years 6 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
« Prev « First page 1971 / 2116 Last » Next »