Sciweavers

8655 search results - page 489 / 1731
» Challenges for Trusted Computing
Sort
View
UM
2007
Springer
15 years 11 months ago
Mobile Opportunistic Planning: Methods and Models
Abstract. We present a study exploring the promise of developing computational systems to support the discovery and execution of opportunistic activities in mobile settings. We int...
Eric Horvitz, Paul Koch, Muru Subramani
GD
2003
Springer
15 years 10 months ago
Selected Open Problems in Graph Drawing
Abstract. In this manuscript, we present several challenging and interesting open problems in graph drawing. The goal of the listing in this paper is to stimulate future research i...
Franz-Josef Brandenburg, David Eppstein, Michael T...
PCM
2001
Springer
119views Multimedia» more  PCM 2001»
15 years 9 months ago
IP Traffic Monitoring: An Overview and Future Considerations
An overview on emerging IP traffic monitoring is presented. Important parameters to characterize the traffic, network and QoS, are discussed. The infrastructure and methodology to ...
Dong Wei, Nirwan Ansari
ASSETS
2008
ACM
15 years 6 months ago
Designing technology to aid cognition
We present a framework for technological aids for cognition intended primarily for individuals with cognitive impairments and seniors experiencing cognitive decline. We illustrate...
Ronald M. Baecker
ACL
2008
15 years 6 months ago
A Hierarchical Approach to Encoding Medical Concepts for Clinical Notes
This paper proposes a hierarchical text categorization (TC) approach to encoding free-text clinical notes with ICD-9-CM codes. Preliminary experimental result on the 2007 Computat...
Yitao Zhang