Sciweavers

5866 search results - page 1153 / 1174
» An e-Process Selection Model
Sort
View
CCS
2008
ACM
15 years 1 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
105
Voted
JCDL
2010
ACM
187views Education» more  JCDL 2010»
15 years 1 months ago
Social network document ranking
In search engines, ranking algorithms measure the importance and relevance of documents mainly based on the contents and relationships between documents. User attributes are usual...
Liang Gou, Xiaolong Zhang, Hung-Hsuan Chen, Jung-H...
MIR
2010
ACM
163views Multimedia» more  MIR 2010»
15 years 1 months ago
SNDocRank: a social network-based video search ranking framework
Multimedia ranking algorithms are usually user-neutral and measure the importance and relevance of documents by only using the visual contents and meta-data. However, users’ int...
Liang Gou, Hung-Hsuan Chen, Jung-Hyun Kim, Xiaolon...
ATVA
2006
Springer
109views Hardware» more  ATVA 2006»
15 years 1 months ago
Proactive Leader Election in Asynchronous Shared Memory Systems
Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speakin...
M. C. Dharmadeep, K. Gopinath
CODES
2008
IEEE
15 years 1 months ago
Profiling of lossless-compression algorithms for a novel biomedical-implant architecture
In view of a booming market for microelectronic implants, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core targeting...
Christos Strydis, Georgi Gaydadjiev
« Prev « First page 1153 / 1174 Last » Next »