Sciweavers

1815 search results - page 168 / 363
» Cloud Computing: An Overview
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
14 years 6 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 24 days ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
HICSS
2012
IEEE
291views Biometrics» more  HICSS 2012»
13 years 5 months ago
Product Performance Based Business Models: A Service Based Perspective
The migration to a service based economy has led many firms to emphasize the service component of their product offerings. This shift has led to the emergence of a business model ...
Morris A. Cohen
ASIAN
2004
Springer
73views Algorithms» more  ASIAN 2004»
15 years 3 months ago
Towards Flexible Graphical Communication Using Adaptive Diagrams
Abstract. Unlike today where the majority of diagrams are static, lifeless objects reflecting their origin in print media, the computer of the near future will provide more flexi...
Kim Marriott, Bernd Meyer, Peter J. Stuckey
ICPR
2010
IEEE
14 years 10 months ago
Challenges of Human Behavior Understanding
Recent advances in pattern recognition has allowed computer scientists and psychologists to jointly address automatic analysis of of human behavior via computers. The Workshop on H...
Albert Ali Salah, Theo Gevers, Nicu Sebe, Alessand...