Filters








74 Hits in 6.8 sec

An Inprovement of Information Retrieval System Using World Location Information

Kwang Young Kim, Du Seok Jin, YoonSoo Choi, JinSuk Kim, YoungKyoon Suh, J. Seo
International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)  
This paper suggests that using word location information of a user query can exactly improve the result of information retrieval system.  ...  This paper makes directly experiments on retrieval system with various weight methods of word location information.  ...  The word location information weight affected the improvement of information retrieval system. Using too much alpha value will decrease the improvement of system like table 3 and figure 3.  ... 
doi:10.1109/cimca.2005.1631338 dblp:conf/cimca/KimJCKSS05 fatcat:cbsyid7lojdqhe3grnnxl46kzm

Evaluation of Filesystem Provenance Visualization Tools

Michelle A. Borkin, Chelsea S. Yeh, Madelaine Boyd, Peter Macko, Krzysztof Z. Gajos, Margo Seltzer, Hanspeter Pfister
2013 IEEE Transactions on Visualization and Computer Graphics  
We present a new tool, InProv, which displays filesystem provenance with an interactive radial-based tree layout.  ...  The results demonstrate that InProv results in higher accuracy in identifying system activity than Orbiter with large complex data sets.  ...  Borkin was supported by the Department of Defense through the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program, and C.  ... 
doi:10.1109/tvcg.2013.155 pmid:24051814 fatcat:livyoakxzrdtfjdlannsn63ccu

Capitalizing on intellectual assets

K.-T. Huang
1998 IBM Systems Journal  
Knowledge Cockpit captures information from a wide range of sources and funnels the information to one location, saving time and money.  ...  In today’s world of open information architectures, customers have many choices, and enterprises have to move quickly and efficiently so they can not only react to, but also an- ticipate customer needs  ... 
doi:10.1147/sj.374.0570 fatcat:iuxyfxdzm5hdrgy5slofimvaom

RePriv: Re-imagining Content Personalization and In-browser Privacy

Matthew Fredrikson, Benjamin Livshits
2011 2011 IEEE Symposium on Security and Privacy  
We go on to discuss an extension framework that allows third-party code to extract and disseminate more detailed information, as well as language-based techniques for verifying the absence of privacy leaks  ...  We present REPRIV, a system that combines the goals of privacy and content personalization in the browser.  ...  ACKNOWLEDGMENTS We wanted to thank several researchers for their help with various aspects of this project.  ... 
doi:10.1109/sp.2011.37 dblp:conf/sp/FredriksonL11 fatcat:v7yobvwg5zdq3fn5be6ejjm7xq

A Prefetching Scheme Exploiting both Data Layout and Access History on Disk

Song Jiang, Xiaoning Ding, Yuehai Xu, Kei Davis
2013 ACM Transactions on Storage  
Current disk prefetch policies in major operating systems track access patterns at the level of file abstraction.  ...  Prefetching is an important technique for improving effective hard disk performance.  ...  The first is what information about disk locations and access times should be used by the prefetch policy.  ... 
doi:10.1145/2501620.2508010 fatcat:r7iw6fosynetnjb33qitequgfa

Performance Analysis of Load Balancing Algorithms using Microsoft Windows Azure Cloud Platform

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper work considers various load balancing mechanisms for the allocation of resources and also shows a comparative study on them with the help of an example scenario.  ...  These load balancing algorithms are applied on applications like real-time systems and prioritized medical field related data storage system.  ...  Virtualization is an abstraction layer between the client and cloud resources. Using the concept of virtualization, we can create a virtual world where a broad range of resource is available.  ... 
doi:10.35940/ijitee.i8458.0881019 fatcat:fpl5rukys5ftrovasi6lj2qut4

The Automation of Proof by Mathematical Induction [chapter]

Alan Bundy
2001 Handbook of Automated Reasoning  
Thus mathematical induction is a key enabling technology for the use of formal methods in information technology.  ...  Failure to automate inductive reasoning is one of the major obstacles to the widespread use of formal methods in industrial hardware and software development.  ...  We present an inference system to prove inductive validity of a set of clauses. This inference system may also be used to disprove the inductive validity of a clause.  ... 
doi:10.1016/b978-044450813-3/50015-1 fatcat:y2m3e2cjjfhf5nvs734xddyxqi

Continuous user authentication using multi-modal biometrics

Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
2015 Computers & security  
Continuous User Authentication Using Multimodal Biometrics Hataichanok Saevanee It is commonly acknowledged that mobile devices now form an integral part of an individual's everyday life.  ...  By using a combination of biometrics, the results showed clearly that the classification performance is better than using single biometric technique achieving EER 3.3%.  ...  , quality of the sample, and information on the data location of the biometric samples.  ... 
doi:10.1016/j.cose.2015.06.001 fatcat:as4gtrnngbgmlmcay27kvezeba

A Model-Based System for Real-Time Articulated Hand Tracking Using a Simple Data Glove and a Depth Camera

Linjun Jiang, Hailun Xia, Caili Guo
2019 Sensors  
For accurate hand tracking, we introduce a new set of degrees of freedom (DoFs), a shape adjustment term for personalizing the triangular mesh model, and an adaptive collision term to prevent self-intersection  ...  Quantitative experiments show the comparable or increased accuracy of our system over the state-of-the-art with about 40% improvement in robustness.  ...  Figure 5c shows the location, initial coordinate systems, and orientation of those IMUs.  ... 
doi:10.3390/s19214680 fatcat:3wpwdxlgdzhvxmisc2v4r5sga4

1986-1999 combined index IEEE aerospace and electronic systems magazine vols. 1-14 [Subject Index]

2000 IEEE Transactions on Aerospace and Electronic Systems  
AES-MAug92 command and control ground support systems from non-US joumals; search strategy and 50 retrieved abstracts. Doerr, Joan, AES-M Dec 86 computer-related failures/disasters listing.  ...  Parish, D.J., + , Cassini Information Access System, intranet technol. implement. computerized flight inspection system for testing basic air navigation AES-MMa.v 96 3-8 Sahraoui.  ...  Driver information systems; Engineering information systems; Geographic information systems; Management information systems; Military information systems; Public information systems; Traffic information  ... 
doi:10.1109/taes.2000.869530 fatcat:dqlflsnslveyri76fpijskbzqi

How Entrepreneurial Firms Prosper while Larger Firms Crumble

P. K. Shukla
2009 International Journal of Business and Management  
KRM system achieves the integration of internal management Utilizing remote communication network, fully making use of ERP system and eliminating the isolation of information in companies, KRM system fulfills  ...  (Coursework, 2005) Firstly, location strategy was used to reach high brand awareness.  ...  Now we use "reverse algorithm" of dynamic programming method to solve the whole issue stage by stage, given S=S 1 =6.  ... 
doi:10.5539/ijbm.v4n3p3 fatcat:n6aggtoyanenpnge7qsmzbh6uu

Molecular Informatics Studies of the Iron-Dependent Regulator (ideR) Reveal Potential Novel Anti-Mycobacterium ulcerans Natural Product-Derived Compounds

Samuel K. Kwofie, Kweku S. Enninful, Jaleel A. Yussif, Lina A. Asante, Mavis Adjei, Kwabena Kan-Dapaah, Elvis K. Tiburu, Wilhelmina A. Mensah, Whelton A. Miller, Lydia Mosi, Michael D. Wilson
2019 Molecules  
The three-dimensional structure of the ideR for Mycobacterium ulcerans was generated using homology modeling.  ...  Its virulence is attributed to the dermo-necrotic polyketide toxin mycolactone, whose synthesis is regressed when its iron acquisition system regulated by the iron-dependent regulator (ideR) is deactivated  ...  An exhaustiveness of 8 was used for both screenings. 5.5.  ... 
doi:10.3390/molecules24122299 fatcat:vky6pnlwpbecjeycchv7wox5s4

Page 3 of Cincinnati Weekly Herald and Philanthropist Vol. 6, Issue 10 [page]

1841 Cincinnati Weekly Herald and Philanthropist  
As another evidence of still further inprove- ment, it is stated that the Governor of the island has ordered the erection of Sunday schools in Ha- vana, in which children of all clases may be edu- cated  ...  Hundreds vpon hundreds of certificates have been offered of their wonderful virtues, from those who have been saved from an ulimely grave, and restored to perfect health, by using them, The Rev, James  ... 

Transformation conditions of future factory structures technology, organization, education and vocational training

Rainer Schultz-Wild
1988 Computer-integrated manufacturing systems  
Mit der Verwendung dieses Dokuments erkennen Sie die Nutzungsbedingungen an.  ...  The UMIST project illustrates how information that has traditionally been kept in the hands of the production department may be presented to shopfloor personnel via terminals located at the machines in  ...  is an increasing need to tie up the use of technology with consent among users.  ... 
doi:10.1016/0951-5240(88)90091-2 fatcat:5lceztqznzchxackfsu36ixlfa

Evolving ground system architecture requirements for the National Polar-orbiting Operational Environmental Satellite System (NPOESS)

J.L. Duda, J. Mulligan, J.M. Henegar
IEEE International Geoscience and Remote Sensing Symposium  
Vision of a Web of Sensors.  ...  The Integrated Program Office (IPO) is developing a ground system architecture for the National Polarorbiting Operational Environmental Satellite System (NPOESS) because requirements cannot be accommodated  ...  effective information system infrastructure, a Data Records Dictionary to locate and manage the information assets of the global weather and climate measurement system, and a measurement data flow template  ... 
doi:10.1109/igarss.2002.1025045 dblp:conf/igarss/DudaMH02 fatcat:f53oy33tgjgxti6vvmqtxvl3yy
« Previous Showing results 1 — 15 out of 74 results