Sciweavers

614 search results - page 77 / 123
» Information Integrity Technology Product Structure
Sort
View
JMM2
2006
126views more  JMM2 2006»
14 years 9 months ago
Modeling Augmented Reality User Interfaces with SSIML/AR
Augmented Reality (AR) technologies open up new possibilities especially for task-focused domains such as assembly and maintenance. However, it can be noticed that there is still a...
Arnd Vitzthum, Heinrich Hussmann
BMCBI
2007
149views more  BMCBI 2007»
14 years 10 months ago
Novel and simple transformation algorithm for combining microarray data sets
Background: With microarray technology, variability in experimental environments such as RNA sources, microarray production, or the use of different platforms, can cause bias. Suc...
Ki-Yeol Kim, Dong Hyuk Ki, Ha Jin Jeong, Hei-Cheul...
ISORC
2000
IEEE
15 years 2 months ago
A Vision of the Future for the Air Force (and Perhaps the Whole DoD)
The Air Force has enthusiastically endorsed, at its most senior levels, advanced thinking with regard to the application of information technology. Recently, the notion of a Joint...
Thomas F. Saunders
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
AINA
2007
IEEE
15 years 4 months ago
Wireless Sensor Network Applications in Urban Telehealth
Advances in wireless sensor network management have potential applications in urban telehealth. Telehealth is the delivery of health related services and information via telecommu...
Patricia Morreale