Sciweavers

7962 search results - page 1573 / 1593
» Conceptions of information science
Sort
View
CCS
2008
ACM
14 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CLEANDB
2006
ACM
142views Database» more  CLEANDB 2006»
14 years 11 months ago
QUEST: QUery-driven Exploration of Semistructured Data with ConflicTs and Partial Knowledge
An important reality when integrating scientific data is the fact that data may often be "missing", partially specified, or conflicting. Therefore, in this paper, we pre...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
DMIN
2008
158views Data Mining» more  DMIN 2008»
14 years 11 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
GRAPHICSINTERFACE
2007
14 years 11 months ago
Visualization and exploration of time-varying medical image data sets
In this work, we propose and compare several methods for the visualization and exploration of time-varying volumetric medical images based on the temporal characteristics of the d...
Zhe Fang, Torsten Möller, Ghassan Hamarneh, A...
MEDINFO
2007
177views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
The Molecular Medicine Informatics Model (MMIM)
In 2005, a major collaboration in Melbourne Australia successfully completed implementing a major medical informatics infrastructure – this is now being used for discovery resear...
Marienne Hibbert, Peter Gibbs, Terence O'brien, Pe...
« Prev « First page 1573 / 1593 Last » Next »