Search

Showing total 1,076 results

Search Constraints

Start Over You searched for: Topic computer.software_genre Remove constraint Topic: computer.software_genre Publisher springer-verlag Remove constraint Publisher: springer-verlag
1,076 results

Search Results

1. Integrating Dictation with PACS to Eliminate Paper

2. Overlaying Paper Maps with Digital Information Services for Tourists

5. Network immunization and virus propagation in email networks: experimental evaluation and analysis

6. Evaluation of multiple variate selection methods from a biological perspective: a nutrigenomics case study

7. A next generation, pilot-scale continuous sterilization system for fermentation media

8. Caching Trust Rather Than Content

9. The KCM system: Speeding-up logic programming through hardware support

10. Impacted Inverted Teeth with their Possible Treatment Protocols

11. Improving SIEM for critical SCADA water infrastructures using machine learning

12. Comparative study of AR versus video tutorials for minor maintenance operations

13. Utilizing geospatial information to implement SDGs and monitor their Progress

14. A novel stateless authentication protocol

15. A neural network filtering approach for similarity-based remaining useful life estimation

16. On the effects of the fix geometric constraint in 2D profiles on the reusability of parametric 3D CAD models

17. Sparse analytic hierarchy process: an experimental analysis

18. Proxy-based near real-time TV content transmission in mobility over 4G with MPEG-DASH transcoding on the cloud

19. Limits to anonymity when using credentials

20. Exploring Functional Acceleration of OpenCL on FPGAs and GPUs Through Platform-Independent Optimizations

21. An LSH-Based Model-Words-Driven Product Duplicate Detection Method

22. A Multilevel Approach to Sentiment Analysis of Figurative Language in Twitter

23. Cross-language transfer of semantic annotation via targeted crowdsourcing: task design and evaluation

24. Structural Feature Selection for Event Logs

25. Discovering High-Utility Itemsets at Multiple Abstraction Levels

26. Slicing concurrent constraint programs

27. Evidence analysis method using Bloom filter for MANET forensics

28. Feature-space transformation improves supervised segmentation across scanners

29. Security Analysis of CRT-Based Cryptosystems

30. Further Security Analysis of XTR

31. Towards a framework for the development of adaptable service-based applications

32. Can the Documented Patient Briefing Be Carried Out with an iPad App?

33. Cost model development using virtual manufacturing and data mining: part I—methodology development

34. Improving Test Result Follow-up through Electronic Health Records Requires More than Just an Alert

35. Building general purpose security services on trusted computing

36. A General-Purpose Virtualization Service for HPC on Cloud Computing: An Application to GPUs

37. Evaluation of Link System between Repository and Researcher Database

38. Challenges and trends in wireless ubiquitous computing systems

39. Meet-in-the-Middle Attacks on Reduced-Round XTEA

40. Artificial evolution in computer aided design: from the optimization of parameters to the creation of assembly programs

41. Artificial intelligent system for multimedia services in smart home environments

42. NTRULO: A Tunneling Architecture for Multimedia Conferencing over IP

43. Precise specification of design pattern structure and behaviour

44. Do you trust your phone?

45. The Append-only Web Bulletin Board

46. Securing Real-time Sessions in an IMS-based Architecture

47. UML-Based Modeling for What-If Analysis

48. BPMN: How Much Does It Cost? An Incremental Approach

49. Structural patterns for descriptive documents

50. Multi-agent and Data Mining Technologies for Situation Assessment in Security-related Applications