Sciweavers

8468 search results - page 1591 / 1694
» The Technology of Data Stashing
Sort
View
NAR
1998
122views more  NAR 1998»
14 years 9 months ago
The PIR-International Protein Sequence Database
The Protein Information Resource (PIR; http://wwwnbrf.georgetown.edu/pir/ ) supports research on molecular evolution, functional genomics, and computational biology by maintaining...
Winona C. Barker, John S. Garavelli, Daniel H. Haf...
INFOCOM
2010
IEEE
14 years 8 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
JUCS
2010
183views more  JUCS 2010»
14 years 8 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
MTA
2010
175views more  MTA 2010»
14 years 8 months ago
Building a web-scale image similarity search system
As the number of digital images is growing fast and Content-based Image Retrieval (CBIR) is gaining in popularity, CBIR systems should leap towards Webscale datasets. In this paper...
Michal Batko, Fabrizio Falchi, Claudio Lucchese, D...
« Prev « First page 1591 / 1694 Last » Next »