Sciweavers

6239 search results - page 1111 / 1248
» From Zinc to Design Model
Sort
View
123
Voted
PVLDB
2010
117views more  PVLDB 2010»
14 years 11 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
TELSYS
2010
122views more  TELSYS 2010»
14 years 11 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
TMI
2010
133views more  TMI 2010»
14 years 11 months ago
Synthetic Magnetic Resonance Imaging Revisited
—Synthetic magnetic resonance (MR) imaging is an approach suggested in the literature to predict MR images at different design parameter settings from at least three observed MR ...
Ranjan Maitra, John J. Riddles
UMUAI
2010
105views more  UMUAI 2010»
14 years 11 months ago
Towards personality-based user adaptation: psychologically informed stylistic language generation
Conversation is an essential component of social behavior, one of the primary means by which humans express intentions, beliefs, emotions, attitudes and personality. Thus the deve...
François Mairesse, Marilyn A. Walker
140
Voted
WWW
2010
ACM
14 years 11 months ago
A framework for trust establishment and assessment on the web of data
With the enormous and still growing amount of data and user interaction on the Web, it becomes more and more necessary for data consumers to be able to assess the trustworthiness ...
Qi Gao, Geert-Jan Houben
« Prev « First page 1111 / 1248 Last » Next »