Sciweavers

191 search results - page 27 / 39
» Bridging the student support gap
Sort
View
ICDAR
2009
IEEE
13 years 7 months ago
ICDAR 2009 Signature Verification Competition
Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is perfor...
Vivian L. Blankers, C. Elisa van den Heuvel, Katri...
ICOODB
2009
246views Database» more  ICOODB 2009»
13 years 7 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
IEEEVAST
2010
13 years 4 months ago
NetClinic: Interactive visualization to enhance automated fault diagnosis in enterprise networks
Diagnosing faults in an operational computer network is a frustrating, time-consuming exercise. Despite advances, automatic diagnostic tools are far from perfect: they occasionall...
Zhicheng Liu, Bongshin Lee, Srikanth Kandula, Ratu...
CHI
2011
ACM
13 years 1 months ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
GECCO
2011
Springer
264views Optimization» more  GECCO 2011»
13 years 1 months ago
Critical factors in the performance of novelty search
Novelty search is a recently proposed method for evolutionary computation designed to avoid the problem of deception, in which the fitness function guides the search process away...
Steijn Kistemaker, Shimon Whiteson