Sciweavers

3628 search results - page 154 / 726
» Approaching the Physical Limits of Computing
Sort
View
102
Voted
COMPSEC
2008
138views more  COMPSEC 2008»
14 years 10 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
71
Voted
JNCA
2007
108views more  JNCA 2007»
14 years 10 months ago
Delivering adaptivity through context-awareness
Developing applications and deploying services for mobile users raises a number of issues and challenges that must be successfully addressed before the era of truly ubiquitous com...
Michael J. O'Grady, Gregory M. P. O'Hare, C. Donag...
KDD
2004
ACM
151views Data Mining» more  KDD 2004»
15 years 10 months ago
Feature selection in scientific applications
Numerous applications of data mining to scientific data involve the induction of a classification model. In many cases, the collection of data is not performed with this task in m...
Erick Cantú-Paz, Shawn Newsam, Chandrika Ka...
76
Voted
PRICAI
2000
Springer
15 years 1 months ago
Extracting Logical Schema from the Web
One of the main limitations when accessing the web is the lack of explicit structure, whose presence may help in understanding data semantics. Schema for web data can be constructe...
Vincenza Carchiolo, Alessandro Longheu, Michele Ma...
CGF
2008
81views more  CGF 2008»
14 years 10 months ago
Lagrangian Visualization of Flow-Embedded Surface Structures
The powerful yet conceptually simple notions of Finite-Time Lyapunov Exponent (FTLE) and Lagrangian Coherent Structures provide a powerful framework for the analysis and visualiza...
Christoph Garth, Alexander Wiebel, Xavier Tricoche...