Sciweavers

490 search results - page 96 / 98
» Enabling User Control with Personal Identity Management
Sort
View
87
Voted
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
15 years 10 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
SIGIR
2010
ACM
15 years 2 months ago
Context-aware ranking in web search
The context of a search query often provides a search engine meaningful hints for answering the current query better. Previous studies on context-aware search were either focused ...
Biao Xiang, Daxin Jiang, Jian Pei, Xiaohui Sun, En...
106
Voted
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
15 years 2 months ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
AAMAS
2004
Springer
14 years 10 months ago
A Manifesto for Agent Technology: Towards Next Generation Computing
The European Commission's eEurope initiative aims to bring every citizen, home, school, business and administration online to create a digitally literate Europe. The value lie...
Michael Luck, Peter McBurney, Chris Preist
93
Voted
GCC
2003
Springer
15 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou