Sciweavers

3225 search results - page 516 / 645
» Measures of Similarity
Sort
View
SRDS
2006
IEEE
15 years 7 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
CSCW
2006
ACM
15 years 7 months ago
What goes around comes around: an analysis of del.icio.us as social space
An emergent class of web applications blurs the boundary between single user application and online public space. Recently popular web applications like del.icio.us help manage in...
Kathy J. Lee
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 7 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
135
Voted
MIR
2006
ACM
150views Multimedia» more  MIR 2006»
15 years 7 months ago
Exploring temporal consistency for video analysis and retrieval
Temporal consistency is ubiquitous in video data, where temporally adjacent video shots usually share similar visual and semantic content. This paper presents a thorough study of ...
Jun Yang 0003, Alexander G. Hauptmann