Sciweavers

6104 search results - page 1101 / 1221
» Constructing Information Bases Using Associative Structures
Sort
View
SSPR
2000
Springer
15 years 7 months ago
Studies of Radical Model for Retrieval of Cursive Chinese Handwritten Annotations
Our research focuses on Chinese online ink matching that tries to match handwritten annotations with handwritten queries without attempting to recognize them. Previously, we propos...
Matthew Y. Ma, Chi Zhang, Patrick Shen-Pei Wang
167
Voted
IM
2003
15 years 4 months ago
Towards XML Oriented Internet Management
: Internet Management is based on IETF specifications that have been developed and used during the past 14 years: There are multiple versions and options of the management protoco...
Frank Strauß, Torsten Klie
139
Voted
CCS
2010
ACM
15 years 3 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
BMCBI
2008
85views more  BMCBI 2008»
15 years 3 months ago
Merging microarray data from separate breast cancer studies provides a robust prognostic test
Background: There is an urgent need for new prognostic markers of breast cancer metastases to ensure that newly diagnosed patients receive appropriate therapy. Recent studies have...
Lei Xu, Aik Choon Tan, Raimond L. Winslow, Donald ...
102
Voted
ENTCS
2007
110views more  ENTCS 2007»
15 years 3 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
« Prev « First page 1101 / 1221 Last » Next »