A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Inprovement of Information Retrieval System Using World Location Information
International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)
This paper suggests that using word location information of a user query can exactly improve the result of information retrieval system. ...
This paper makes directly experiments on retrieval system with various weight methods of word location information. ...
The word location information weight affected the improvement of information retrieval system. Using too much alpha value will decrease the improvement of system like table 3 and figure 3. ...
doi:10.1109/cimca.2005.1631338
dblp:conf/cimca/KimJCKSS05
fatcat:cbsyid7lojdqhe3grnnxl46kzm
Evaluation of Filesystem Provenance Visualization Tools
2013
IEEE Transactions on Visualization and Computer Graphics
We present a new tool, InProv, which displays filesystem provenance with an interactive radial-based tree layout. ...
The results demonstrate that InProv results in higher accuracy in identifying system activity than Orbiter with large complex data sets. ...
Borkin was supported by the Department of Defense through the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program, and C. ...
doi:10.1109/tvcg.2013.155
pmid:24051814
fatcat:livyoakxzrdtfjdlannsn63ccu
Capitalizing on intellectual assets
1998
IBM Systems Journal
Knowledge Cockpit captures information from a wide range of sources and funnels the information to one location, saving time and money. ...
In today’s world of open information architectures, customers have many choices, and enterprises have to move quickly and efficiently so they can not only react to, but also an- ticipate customer needs ...
doi:10.1147/sj.374.0570
fatcat:iuxyfxdzm5hdrgy5slofimvaom
RePriv: Re-imagining Content Personalization and In-browser Privacy
2011
2011 IEEE Symposium on Security and Privacy
We go on to discuss an extension framework that allows third-party code to extract and disseminate more detailed information, as well as language-based techniques for verifying the absence of privacy leaks ...
We present REPRIV, a system that combines the goals of privacy and content personalization in the browser. ...
ACKNOWLEDGMENTS We wanted to thank several researchers for their help with various aspects of this project. ...
doi:10.1109/sp.2011.37
dblp:conf/sp/FredriksonL11
fatcat:v7yobvwg5zdq3fn5be6ejjm7xq
A Prefetching Scheme Exploiting both Data Layout and Access History on Disk
2013
ACM Transactions on Storage
Current disk prefetch policies in major operating systems track access patterns at the level of file abstraction. ...
Prefetching is an important technique for improving effective hard disk performance. ...
The first is what information about disk locations and access times should be used by the prefetch policy. ...
doi:10.1145/2501620.2508010
fatcat:r7iw6fosynetnjb33qitequgfa
Performance Analysis of Load Balancing Algorithms using Microsoft Windows Azure Cloud Platform
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper work considers various load balancing mechanisms for the allocation of resources and also shows a comparative study on them with the help of an example scenario. ...
These load balancing algorithms are applied on applications like real-time systems and prioritized medical field related data storage system. ...
Virtualization is an abstraction layer between the client and cloud resources. Using the concept of virtualization, we can create a virtual world where a broad range of resource is available. ...
doi:10.35940/ijitee.i8458.0881019
fatcat:fpl5rukys5ftrovasi6lj2qut4
The Automation of Proof by Mathematical Induction
[chapter]
2001
Handbook of Automated Reasoning
Thus mathematical induction is a key enabling technology for the use of formal methods in information technology. ...
Failure to automate inductive reasoning is one of the major obstacles to the widespread use of formal methods in industrial hardware and software development. ...
We present an inference system to prove inductive validity of a set of clauses. This inference system may also be used to disprove the inductive validity of a clause. ...
doi:10.1016/b978-044450813-3/50015-1
fatcat:y2m3e2cjjfhf5nvs734xddyxqi
Continuous user authentication using multi-modal biometrics
2015
Computers & security
Continuous User Authentication Using Multimodal Biometrics Hataichanok Saevanee It is commonly acknowledged that mobile devices now form an integral part of an individual's everyday life. ...
By using a combination of biometrics, the results showed clearly that the classification performance is better than using single biometric technique achieving EER 3.3%. ...
, quality of the sample, and information on the data location of the biometric samples. ...
doi:10.1016/j.cose.2015.06.001
fatcat:as4gtrnngbgmlmcay27kvezeba
A Model-Based System for Real-Time Articulated Hand Tracking Using a Simple Data Glove and a Depth Camera
2019
Sensors
For accurate hand tracking, we introduce a new set of degrees of freedom (DoFs), a shape adjustment term for personalizing the triangular mesh model, and an adaptive collision term to prevent self-intersection ...
Quantitative experiments show the comparable or increased accuracy of our system over the state-of-the-art with about 40% improvement in robustness. ...
Figure 5c shows the location, initial coordinate systems, and orientation of those IMUs. ...
doi:10.3390/s19214680
fatcat:3wpwdxlgdzhvxmisc2v4r5sga4
1986-1999 combined index IEEE aerospace and electronic systems magazine vols. 1-14 [Subject Index]
2000
IEEE Transactions on Aerospace and Electronic Systems
AES-MAug92 command and control ground support systems from non-US joumals; search strategy and 50 retrieved abstracts. Doerr, Joan, AES-M Dec 86 computer-related failures/disasters listing. ...
Parish, D.J., + , Cassini Information Access System, intranet technol. implement. computerized flight inspection system for testing basic air navigation AES-MMa.v 96 3-8 Sahraoui. ...
Driver information systems; Engineering information systems; Geographic information systems; Management information systems; Military information systems; Public information systems; Traffic information ...
doi:10.1109/taes.2000.869530
fatcat:dqlflsnslveyri76fpijskbzqi
How Entrepreneurial Firms Prosper while Larger Firms Crumble
2009
International Journal of Business and Management
KRM system achieves the integration of internal management Utilizing remote communication network, fully making use of ERP system and eliminating the isolation of information in companies, KRM system fulfills ...
(Coursework, 2005) Firstly, location strategy was used to reach high brand awareness. ...
Now we use "reverse algorithm" of dynamic programming method to solve the whole issue stage by stage, given S=S 1 =6. ...
doi:10.5539/ijbm.v4n3p3
fatcat:n6aggtoyanenpnge7qsmzbh6uu
Molecular Informatics Studies of the Iron-Dependent Regulator (ideR) Reveal Potential Novel Anti-Mycobacterium ulcerans Natural Product-Derived Compounds
2019
Molecules
The three-dimensional structure of the ideR for Mycobacterium ulcerans was generated using homology modeling. ...
Its virulence is attributed to the dermo-necrotic polyketide toxin mycolactone, whose synthesis is regressed when its iron acquisition system regulated by the iron-dependent regulator (ideR) is deactivated ...
An exhaustiveness of 8 was used for both screenings.
5.5. ...
doi:10.3390/molecules24122299
fatcat:vky6pnlwpbecjeycchv7wox5s4
Page 3 of Cincinnati Weekly Herald and Philanthropist Vol. 6, Issue 10
[page]
1841
Cincinnati Weekly Herald and Philanthropist
As another evidence of still further inprove- ment, it is stated that the Governor of the island has ordered the erection of Sunday schools in Ha- vana, in which children of all clases may be edu- cated ...
Hundreds vpon hundreds of certificates have been offered of their wonderful virtues, from those who have been saved from an ulimely grave, and restored to perfect health, by using them,
The Rev, James ...
Transformation conditions of future factory structures technology, organization, education and vocational training
1988
Computer-integrated manufacturing systems
Mit der Verwendung dieses Dokuments erkennen Sie die Nutzungsbedingungen an. ...
The UMIST project illustrates how information that has traditionally been kept in the hands of the production department may be presented to shopfloor personnel via terminals located at the machines in ...
is an increasing need to tie up the use of technology with consent among users. ...
doi:10.1016/0951-5240(88)90091-2
fatcat:5lceztqznzchxackfsu36ixlfa
Evolving ground system architecture requirements for the National Polar-orbiting Operational Environmental Satellite System (NPOESS)
IEEE International Geoscience and Remote Sensing Symposium
Vision of a Web of Sensors. ...
The Integrated Program Office (IPO) is developing a ground system architecture for the National Polarorbiting Operational Environmental Satellite System (NPOESS) because requirements cannot be accommodated ...
effective information system infrastructure, a Data Records Dictionary to locate and manage the information assets of the global weather and climate measurement system, and a measurement data flow template ...
doi:10.1109/igarss.2002.1025045
dblp:conf/igarss/DudaMH02
fatcat:f53oy33tgjgxti6vvmqtxvl3yy
« Previous
Showing results 1 — 15 out of 74 results