Sciweavers

1354 search results - page 155 / 271
» Generalized real analysis and its applications
Sort
View
DEXA
2006
Springer
193views Database» more  DEXA 2006»
15 years 1 months ago
Understanding and Enhancing the Folding-In Method in Latent Semantic Indexing
Abstract. Latent Semantic Indexing(LSI) has been proved to be effective to capture the semantic structure of document collections. It is widely used in content-based text retrieval...
Xiang Wang 0002, Xiaoming Jin
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 5 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
AXMEDIS
2006
IEEE
241views Multimedia» more  AXMEDIS 2006»
15 years 1 months ago
SMIL to MPEG-4 BIFS Conversion
Traditional media, such as text, image, audio and video, have long been the main media resources and granted full support of standard desktop tools and applications. Interactive r...
Beilu Shao, Laureano Moro Velazquez, Nicolas Scari...
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 3 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
PLDI
2004
ACM
15 years 3 months ago
The set constraint/CFL reachability connection in practice
Many program analyses can be reduced to graph reachability problems involving a limited form of context-free language reachability called Dyck-CFL reachability. We show a new redu...
John Kodumal, Alexander Aiken