Sciweavers

118 search results - page 12 / 24
» The Myth of the Computer Revolution
Sort
View
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
GECCO
2009
Springer
190views Optimization» more  GECCO 2009»
15 years 1 months ago
Genetic programming for protein related text classification
Since the genomics revolution, bioinformatics has never been so popular. Many researchers have investigated with great success the use of evolutionary computation in bioinformatic...
Marc Segond, Cyril Fonlupt, Denis Robilliard
ICPR
2008
IEEE
15 years 3 months ago
3D localization of partially buried object in unstructured environment
This paper describes a method to localize objects which are partially buried in an unstructured environment. The objects are limited to surfaces of revolution in the present study...
Kenichi Maruyama, Koji Oka, Ryuichi Takase, Yoshih...
OZCHI
2006
ACM
15 years 3 months ago
The Wiki: an environment to revolutionise employees' interaction with corporate knowledge
Some corporations have adopted a Wiki on their Intranets for employees to collectively store, edit and access workrelated material such as reports, best-practice features, and doc...
Helen Hasan, Charmaine C. Pfaff
IADIS
2004
14 years 10 months ago
High School Students and the Digital Age
The computer revolution and Internet expansion in parallel with multimedia advancement have radically changed the way that knowledge is disseminated. All over the world researches...
Paraskevi Mentzelou, Tanya Kyriakidou, Veronica Sa...