Sciweavers

9841 search results - page 1883 / 1969
» Task-Centred Information Management
Sort
View
BCS
2008
15 years 5 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
193
Voted
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 5 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
CDES
2008
123views Hardware» more  CDES 2008»
15 years 5 months ago
R-tree: A Hardware Implementation
R-tree data structures are widely used in spatial databases to store, manage and manipulate spatial information. As the data volume of such databases is typically very large, the q...
Xiang Xiao, Tuo Shi, Pranav Vaidya, Jaehwan John L...
LREC
2010
166views Education» more  LREC 2010»
15 years 5 months ago
A Derivational Rephrasing Experiment for Question Answering
In Knowledge Management, variations in information expressions have proven a real challenge. In particular, classical semantic relations (e.g. synonymy) do not connect words with ...
Bernard Jacquemin
ECSCW
2007
15 years 5 months ago
Social bookmarking and exploratory search
In this paper, we explore various search tasks that are supported by a social bookmarking service. These bookmarking services hold great potential to powerfully combine personal ta...
David R. Millen, Meng Yang, Steven Whittaker, Jona...
« Prev « First page 1883 / 1969 Last » Next »