Sciweavers

43190 search results - page 8582 / 8638
» Can Development Be Designed
Sort
View
AI
2005
Springer
13 years 10 months ago
Unsupervised named-entity extraction from the Web: An experimental study
The KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an unsupervised, doma...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...
IJMMS
2007
83views more  IJMMS 2007»
13 years 10 months ago
Making adaptive cruise control (ACC) limits visible
Previous studies have shown adaptive cruise control (ACC) can compromise driving safety when drivers do not understand how the ACC functions, suggesting that drivers need to be in...
Bobbie D. Seppelt, John D. Lee
SMA
2008
ACM
149views Solid Modeling» more  SMA 2008»
13 years 10 months ago
Exact arrangements on tori and Dupin cyclides
An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyc...
Eric Berberich, Michael Kerber
TASLP
2008
112views more  TASLP 2008»
13 years 9 months ago
A Study in Efficiency and Modality Usage in Multimodal Form Filling Systems
The usage patterns of speech and visual input modes are investigated as a function of relative input mode efficiency for both desktop and personal digital assistant (PDA) working ...
Manolis Perakakis, Alexandros Potamianos
IJWIS
2007
153views more  IJWIS 2007»
13 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
« Prev « First page 8582 / 8638 Last » Next »