Sciweavers

12637 search results - page 2397 / 2528
» Security for Extensible Systems
Sort
View
ENVSOFT
2008
80views more  ENVSOFT 2008»
15 years 3 months ago
Modifications to the SWAT code for modelling direct pesticide losses
In different river catchments in Europe, pesticide concentrations in surface waters frequently exceed the standards, possibly resulting in negative impacts on aquatic fauna and fl...
K. Holvoet, A. van Griensven, V. Gevaert, P. Seunt...
CIKM
2010
Springer
15 years 3 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
COMGEO
2010
ACM
15 years 3 months ago
Sensor bus: an intermediary layer for linking geosensors and the sensor web
In recent years, the standards of OGC’s Sensor Web Enablement (SWE) initiative have been applied in a multitude of projects to encapsulate heterogeneous geosensors for web-based...
Arne Broering, Theodor Foerster, Simon Jirka, Cars...
INFOCOM
2010
IEEE
15 years 2 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
JIDM
2010
160views more  JIDM 2010»
15 years 2 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
« Prev « First page 2397 / 2528 Last » Next »