نتایج جستجو برای: retrievability

تعداد نتایج: 250  

Journal: :Cognitive science 2015
Ullrich K. H. Ecker Gordon D. A. Brown Stephan Lewandowsky

Is consolidation needed to account for retroactive interference in free recall? Interfering mental activity during the retention interval of a memory task impairs performance, in particular if the interference occurs in temporal proximity to the encoding of the to-be-remembered (TBR) information. There are at least two rival theoretical accounts of this temporal gradient of retroactive interfer...

2015
Jalaj Upadhyay

There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor whic...

2009
Emilia Apostolova David S. Channin Jacob Furst Daniela Raicu

Clinical narratives, such as radiology and pathology reports, are commonly available in electronic form. However, they are also commonly entered and stored as free text, and knowledge of their structure is necessary for enhancing the productivity of the healthcare departments and facilitating research. This paper presents a preliminary study attempting to automatically segment medical reports i...

2017
Lu Zhou Shiming Xu Jiping Liu Bin Wang

The accurate knowledge of sea ice parameters, including sea ice thickness and snow depth over the sea ice cover, are key to both climate studies and data assimilation in operational forecasts. Large-scale active and passive remote sensing is the basis for the estimation of these parameters. In traditional altimetry or the retrieval of snow depth with passive microwave sensing, although the sea ...

2010
Benjamin Höferlin Gunther Heidemann

Today, discriminative local features are widely used in different fields of computer vision. Due to their strengths, discriminative local features were recently applied to the problem of traffic sign recognition (TSR). First of all, we discuss how discriminative local features are applied to TSR and which problems arise in this specific domain. Since TSR has to cope with highly structured and s...

2010
Lasse Lehmann

With the growing number of documents which are digitally available, users tend to have more and more problems to organize these documents personally or collaboratively. Specifically for knowledge workers, fast retrieval of relevant documents is essential. In many cases, users have problems to rediscover documents that they or members of their working group once stored somewhere. Often, users ra...

Journal: :J. UCS 2013
Stefan Dietze Eleni Kaldoudi Nikolas Dovrolis Daniela Giordano Concetto Spampinato Maurice Hendrix Aristidis Protopsaltis Davide Taibi HongQing Yu

Research in technology-enhanced learning (TEL) throughout the last decade has largely focused on sharing and reusing educational resources and data. This effort has led to a fragmented landscape of competing metadata schemas, such as IEEE LOM or ADL SCORM, and interface mechanisms, such as OAI-PMH, SQI and REST-ful services in general. More recently, semantic technologies were taken into accoun...

2014
Michael R. Line Heather Knutson Aaron S. Wolf Yuk L. Yung

Secondary eclipse spectroscopy provides invaluable insights into the temperatures and compositions of exoplanetary atmospheres. We carry out a systematic temperature and abundance retrieval analysis of nine exoplanets (HD189733b, HD209458b, HD149026b, GJ436b, WASP-12b, WASP-19b, WASP-43b, TrES-2b, and TrES-3b) observed in secondary eclipse using a combination of spaceand ground-based facilities...

2016
Jia Xu Anjia Yang Jianying Zhou Duncan S. Wong

Proofs of storage (including Proofs of Retrievability and Provable Data Possession) is a cryptographic tool, which enables data owner or third party auditor to audit integrity of data stored remotely in a cloud storage server, without keeping a local copy of data or downloading data back during auditing. We observe that all existing publicly verifiable POS schemes suffer from a serious drawback...

2016
Aldar C.-F. Chan Jun Wen Wong Jianying Zhou Joseph Chee Ming Teo

Two-factor authentication is increasingly demanded in the Internet of Things (IoT), especially those deployed in the critical infrastructure. However, resource and operational constraints of typical IoT devices are the key impediment, especially when the IoT device acts as a verifier. This paper proposes a novel authentication factor (namely, historical data) which, when combined with the conve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید