Sciweavers

1321 search results - page 173 / 265
» A Context Model for Personal Knowledge Management Applicatio...
Sort
View
136
Voted
IJBIDM
2008
114views more  IJBIDM 2008»
15 years 3 months ago
Traffic mining in a road-network: How does the traffic flow?
: The flow of data coming from modern sensing devices enables the development of novel research techniques related to data management and knowledge extraction. In this work, we und...
Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos
141
Voted
DSS
2006
95views more  DSS 2006»
15 years 4 months ago
Process-driven collaboration support for intra-agency crime analysis
In law enforcement applications, there is a critical need for new tools that can facilitate efficient and effective collaboration. Through a field study, we observe that crime ana...
J. Leon Zhao, Henry H. Bi, Hsinchun Chen, Daniel D...
CODES
2010
IEEE
15 years 1 months ago
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor...
Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang...
INAP
2001
Springer
15 years 8 months ago
Defeasible Logic
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
Donald Nute
AIM
2006
15 years 5 months ago
Quality evaluation in information systems outsourcing
: The aim of this study is to assess quality perception of information system (IS) services outsourced by a large Brazilian bank, both from a technical (results) as well as from a ...
Luis Kalb Roses, Norberto Hoppen, Bernard Ballaz, ...