Sciweavers

8468 search results - page 1450 / 1694
» The Technology of Data Stashing
Sort
View
72
Voted
CCS
2006
ACM
15 years 2 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
DSN
2004
IEEE
15 years 2 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
EEE
2004
IEEE
15 years 2 months ago
A Methodology to Find Web Site Keywords
For many companies and/or institutions it is no longer sufficient to have a web site and high quality products or services. What in many cases makes the difference between success...
Juan D. Velásquez, Richard Weber, Hiroshi Y...
CIKM
2006
Springer
15 years 2 months ago
Improving novelty detection for general topics using sentence level information patterns
The detection of new information in a document stream is an important component of many potential applications. In this work, a new novelty detection approach based on the identif...
Xiaoyan Li, W. Bruce Croft
CIKM
2006
Springer
15 years 2 months ago
Estimating average precision with incomplete and imperfect judgments
We consider the problem of evaluating retrieval systems using incomplete judgment information. Buckley and Voorhees recently demonstrated that retrieval systems can be efficiently...
Emine Yilmaz, Javed A. Aslam
« Prev « First page 1450 / 1694 Last » Next »