Sciweavers

726 search results - page 120 / 146
» From Anomaly Reports to Cases
Sort
View
TON
2008
119views more  TON 2008»
14 years 11 months ago
Polynomial time approximation algorithms for multi-constrained QoS routing
We study the multi-constrained Quality-of-Service (QoS) routing problem where one seeks to find a path from a source to a destination in the presence of K 2 additive end-to-end Qo...
Guoliang Xue, Weiyi Zhang, Jian Tang, Krishnaiyan ...
JAMIA
2011
68views more  JAMIA 2011»
14 years 2 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
ECTEL
2007
Springer
15 years 6 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl
INEX
2005
Springer
15 years 5 months ago
INEX 2005 Multimedia Track
In this article the activities of the INEX 2005 Multimedia track are reported. We succesfully realized our objective, to provide an evaluation platform for the evaluation of retrie...
Roelof van Zwol, Gabriella Kazai, Mounia Lalmas
SAC
2009
ACM
15 years 4 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...