Sciweavers

5101 search results - page 244 / 1021
» Capturing Context Requirements
Sort
View
IJDE
2002
145views more  IJDE 2002»
13 years 8 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
JCAL
2002
105views more  JCAL 2002»
13 years 8 months ago
Conceptualising work activity for CAL systems design
As computing technology has increasingly become relevant to people's everyday lives, emphasis is being placed on ensuring Computer Assisted Learning (CAL) tools support users ...
D. Mwanza
ADMA
2010
Springer
314views Data Mining» more  ADMA 2010»
13 years 6 months ago
Best Clustering Configuration Metrics: Towards Multiagent Based Clustering
Multi-Agent Clustering (MAC) requires a mechanism for identifying the most appropriate cluster configuration. This paper reports on experiments conducted with respect to a number o...
Santhana Chaimontree, Katie Atkinson, Frans Coenen
EUROMICRO
2011
IEEE
12 years 8 months ago
Developing Safe and Dependable Sensornets
Sensornets are being widely proposed as a solution technology in a wide number of applications, e.g. health care. As part of this work some key challenges for the safety and senso...
Iain Bate, Yafeng Wu, John A. Stankovic
ICIP
1999
IEEE
14 years 10 months ago
Dynamic Range Improvement Through Multiple Exposures
This paper presents an approach for improving the effective dynamic range of cameras by using multiple photographs of the same scene taken with different exposure times. Using thi...
Mark A. Robertson, Sean Borman, Robert L. Stevenso...