Sciweavers

5758 search results - page 1026 / 1152
» Anonymity-preserving data collection
Sort
View
COSIT
2009
Springer
134views GIS» more  COSIT 2009»
14 years 4 months ago
Evaluating the Effectiveness and Efficiency of Visual Variables for Geographic Information Visualization
We propose an empirical, perception-based evaluation approach for assessing the effectiveness and efficiency of longstanding cartographic design principles applied to 2D map displa...
Simone Garlandini, Sara Irina Fabrikant
DCOSS
2009
Springer
14 years 4 months ago
Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection
Abstract. The optimal allocation of samples for activity-level detection in a wireless body area network for health-monitoring applications is considered. A wireless body area netw...
Gautam Thatte, Viktor Rozgic, Ming Li, Sabyasachi ...
EMSOFT
2009
Springer
14 years 4 months ago
NANDFS: a flexible flash file system for RAM-constrained systems
NANDFS is a flash file system that exposes a memory-performance tradeoff to system integrators. The file system can be configured to use a large amount of RAM, in which case i...
Aviad Zuck, Ohad Barzilay, Sivan Toledo
ERCIMDL
2009
Springer
115views Education» more  ERCIMDL 2009»
14 years 4 months ago
Using Semantic Technologies in Digital Libraries - A Roadmap to Quality Evaluation
In digital libraries semantic techniques are often deployed to reduce the expensive manual overhead for indexing documents, maintaining metadata, or caching for future search. Howe...
Sascha Tönnies, Wolf-Tilo Balke
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
14 years 4 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
« Prev « First page 1026 / 1152 Last » Next »