Sciweavers

5970 search results - page 929 / 1194
» Management Information Model Engineering
Sort
View
DIM
2006
ACM
15 years 11 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ELPUB
2008
ACM
15 years 6 months ago
No Budget, No Worries: Free and Open Source Publishing Software in Biomedical Publishing
Open Medicine (http://www.openmedicine.ca) is an electronic open access, peer-reviewed general medical journal that started publication in April 2007. The editors of Open Medicine...
Tarek Loubani, Sally Murray, Claire Kendall, Anita...
EUROSYS
2009
ACM
16 years 2 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
WSDM
2009
ACM
104views Data Mining» more  WSDM 2009»
15 years 11 months ago
Top-k aggregation using intersections of ranked inputs
There has been considerable past work on efficiently computing top k objects by aggregating information from multiple ranked lists of these objects. An important instance of this...
Ravi Kumar, Kunal Punera, Torsten Suel, Sergei Vas...
COMPSAC
2006
IEEE
15 years 11 months ago
An Agent-Based Metric for Quality of Services over Wireless Networks
In a wireless LAN environment, clients tend to associate with the nearest access point (AP) which usually provides the strongest signal. However, this does not guarantee that user...
Yaw-Chung Chen, Wen-Yen Chen