Sciweavers

3108 search results - page 64 / 622
» The Elements of Computer Credibility
Sort
View
DAC
2001
ACM
15 years 10 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
WWW
2005
ACM
15 years 10 months ago
Guidelines for developing trust in health websites
How do people decide which health websites to trust and which to reject? Thirteen participants all diagnosed with hypertension were invited to search for information and advice re...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...
ICN
2009
Springer
15 years 2 months ago
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
—Ever since Descartes introduced planar coordinate systems, visual representations of data have become a widely accepted way of describing scientific phenomena. Modern advances ...
Mohammad Hammoudeh, Robert M. Newman, Sarah Mount
FDL
2004
IEEE
15 years 1 months ago
SystemC and OCAPI-xl Based System-Level Design for Reconfigurable Systems-on-Chip
Reconfigurability is becoming an important part of System-on-Chip (SoC) design to cope with the increasing demands for simultaneous flexibility and computational power. Current ha...
Kari Tiensyrjä, Miroslav Cupák, Kostas...
CIKM
2008
Springer
14 years 11 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...