Sciweavers

6348 search results - page 1181 / 1270
» A Lesson for Software Engineering from Knowledge Engineering
Sort
View
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
13 years 12 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin
SIGIR
2010
ACM
13 years 11 months ago
How good is a span of terms?: exploiting proximity to improve web retrieval
Ranking search results is a fundamental problem in information retrieval. In this paper we explore whether the use of proximity and phrase information can improve web retrieval ac...
Krysta Marie Svore, Pallika H. Kanani, Nazan Khan
ANCS
2006
ACM
13 years 11 months ago
Packet pre-filtering for network intrusion detection
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe complex attacks, their processing requirements increase rapidly. Hardware and, even more, ...
Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N....
AFRIGRAPH
2001
ACM
13 years 11 months ago
A gesture processing framework for multimodal interaction in virtual reality
This article presents a gesture detection and analysis framework for modelling multimodal interactions. It is particulary designed for its use in Virtual Reality (VR) applications...
Marc Erich Latoschik
CIA
2000
Springer
13 years 11 months ago
Emergent Societies of Information Agents
In the near future, billions of entities will be connected to each other through the Internet. The current trend is that an increasingly number of entities, from smart personal dev...
Paul Davidsson
« Prev « First page 1181 / 1270 Last » Next »