Sciweavers

1497 search results - page 119 / 300
» Online Negative Databases
Sort
View
JCM
2007
143views more  JCM 2007»
15 years 4 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
DBKDA
2010
IEEE
144views Database» more  DBKDA 2010»
15 years 3 months ago
Analysis of the Quality of Life after an Endoscopic Thoracic Sympathectomy: A Business Intelligence Approach
— Primary hyperhidrosis, a disorder characterized by an excessive sweating, has been treated by endoscopic thoracic sympathectomy. As a consequence of the surgery, patients impro...
Diana Goncalves, Maribel Yasmina Santos, Jorge Cru...
CSE
2009
IEEE
15 years 8 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava
ICPR
2002
IEEE
15 years 9 months ago
A Comparison of Techniques for Automatic Clustering of Handwritten Characters
This work reports experiments with four hierarchical clustering algorithms and two clustering indices for online handwritten characters. The main motivation of the work is to deve...
Vuokko Vuori, Jorma Laaksonen
DEBU
2006
105views more  DEBU 2006»
15 years 4 months ago
Community Information Management
We introduce Cimple, a joint project between the University of Illinois and the University of Wisconsin. Cimple aims to develop a software platform that can be rapidly deployed an...
AnHai Doan, Raghu Ramakrishnan, Fei Chen 0002, Ped...