Sciweavers

1275 search results - page 55 / 255
» Are you having difficulty
Sort
View
LOGCOM
2008
99views more  LOGCOM 2008»
13 years 7 months ago
Three Scenarios for the Revision of Epistemic States
This position paper discusses the difficulty of interpreting iterated belief revision in the scope of the existing literature. Axioms of iterated belief revision are often present...
Didier Dubois
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen

Book
455views
15 years 3 months ago
The Design Patterns Java Companion
"The term “design patterns” sounds a bit formal to the uninitiated and can be somewhat off-putting when you first encounter it. But, in fact, design patterns are just co...
James W. Cooper
ICPR
2006
IEEE
14 years 8 months ago
Does EigenPalm work? A System and Evaluation Perspective
Recently, there are keen interests in EigenPalm, which, collectively, refers to those methods that extract palmprint features directly from the appearance by means of Principle Co...
Adams Wai-Kin Kong, David Zhang, Jane You, King Ho...
CHI
2009
ACM
14 years 8 months ago
Design and adoption of social collaboration software within businesses
Social networking and collaboration sites are having a large impact on people's personal lives. These same applications, similar functions and related experiences are being a...
Jason Blackwell, John Sheridan, Keith Instone, Dav...