Sciweavers

3544 search results - page 661 / 709
» Information Security in Open Systems
Sort
View
CIKM
2009
Springer
15 years 2 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
ATAL
2008
Springer
15 years 27 days ago
An adaptive probabilistic trust model and its evaluation
In open settings, the participants are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relie...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
CIKM
2008
Springer
15 years 27 days ago
Feasibility of a primarily digital research library
This position paper explores the issues related to the feasibility of having a primarily digital research library support the teaching and research needs of a university. The Asia...
Geneva L. Henry, Lisa M. Spiro
93
Voted
DGO
2006
128views Education» more  DGO 2006»
15 years 9 days ago
Supporting humanitarian relief logistics operations through online geocollaborative knowledge management
Over the past two years, horrific disasters such as the Asian Tsunami, Hurricane Katrina, and the Pakistan Earthquake have demonstrated the critical need for effective technologic...
Brian M. Tomaszewski, Alan M. MacEachren, Scott Pe...
111
Voted
CGIM
2003
15 years 8 days ago
Snake for Band Edge Extraction and Its Applications
A novel snake model suitable for edge extraction of bandshape objects is presented in this paper. Based on the proposed model, an edge tracking system, EdgeTrak, has been develope...
Min Li, Chandra Kambhamettu, Maureen C. Stone