Sciweavers

10577 search results - page 2108 / 2116
» Active Data Mining
Sort
View
CORR
2008
Springer
161views Education» more  CORR 2008»
13 years 6 months ago
Compressed Sensing of Analog Signals
Abstract--A traditional assumption underlying most data converters is that the signal should be sampled at a rate exceeding twice the highest frequency. This statement is based on ...
Yonina C. Eldar
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ISF
2010
109views more  ISF 2010»
13 years 5 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
JCST
2010
119views more  JCST 2010»
13 years 5 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JOCN
2010
86views more  JOCN 2010»
13 years 5 months ago
Neural Basis of Repetition Priming during Mathematical Cognition: Repetition Suppression or Repetition Enhancement?
■ We investigated the neural basis of repetition priming (RP) during mathematical cognition. Previous studies of RP have focused on repetition suppression as the basis of behavi...
Valorie N. Salimpoor, Catie Chang, Vinod Menon
« Prev « First page 2108 / 2116 Last » Next »