Sciweavers

2926 search results - page 348 / 586
» Document Analysis
Sort
View
EUROSEC
2008
ACM
15 years 6 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
133
Voted
BIOINFORMATICS
2006
96views more  BIOINFORMATICS 2006»
15 years 5 months ago
Joint estimation of calibration and expression for high-density oligonucleotide arrays
Motivation: The need for normalization in microarray experiments has been well documented in the literature. Currently, most analysis methods treat normalization and analysis as a...
Ann L. Oberg, Douglas W. Mahoney, Karla V. Ballman...
TREC
1994
15 years 6 months ago
Indexing Structures Derived from Syntax in TREC-3: System Description
: This paper describes an approach to information retrieval based on a syntactic analysis of the document texts and user queries, and from that analysis, the construction of tree s...
Alan F. Smeaton, Ruairi O'Donnell, Fergus Kelledy
WIDM
2004
ACM
15 years 10 months ago
User evaluation of the NASA technical report server recommendation service
We present the user evaluation of two recommendation server methodologies implemented for the NASA Technical Report Server (NTRS). One methodology for generating recommendations u...
Michael L. Nelson, Johan Bollen, JoAnne R. Calhoun...
JCDL
2005
ACM
104views Education» more  JCDL 2005»
15 years 10 months ago
Language preference in a bi-language digital library
This paper examines user choice of interface language in a bilanguage digital library (English and Māori, the language of the indigenous people of New Zealand). The majority of c...
Te Taka Keegan, Sally Jo Cunningham