Sciweavers

1532 search results - page 226 / 307
» Relational data sharing in peer-based data management system...
Sort
View
HICSS
2007
IEEE
143views Biometrics» more  HICSS 2007»
15 years 4 months ago
B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain
This paper attempts to track key performance indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility sector. Findings point to som...
Ygal Bendavid, Élisabeth Lefebvre, Louis A....
CIKM
2008
Springer
14 years 11 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
VCIP
2003
153views Communications» more  VCIP 2003»
14 years 11 months ago
Flexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Yanjiang Yang, Feng Bao, Robert H. Deng
ICDT
2009
ACM
130views Database» more  ICDT 2009»
15 years 10 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
CIKM
2008
Springer
14 years 11 months ago
Intra-document structural frequency features for semi-supervised domain adaptation
In this work we try to bridge the gap often encountered by researchers who find themselves with few or no labeled examples from their desired target domain, yet still have access ...
Andrew Arnold, William W. Cohen