Sciweavers

993 search results - page 144 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
EUROSYS
2009
ACM
13 years 11 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
ICANN
1997
Springer
13 years 11 months ago
Local Subspace Classifier
Subsystems for on-line recognition of handwriting are needed in personal digital assistants (PDAs) and other portable handheld devices. We have developed a recognition system whic...
Jorma Laaksonen
ESWA
2006
117views more  ESWA 2006»
13 years 7 months ago
A knowledge-based approach to assign breast cancer treatments in oncology units
The aim of this work is to present a developed knowledge-based approach for breast cancer treatment. This Decision Support System (DSS) uses an incremental knowledge acquisition t...
Teddy G. Miranda-Mena, Sandra L. Benítez U....
CHI
2009
ACM
14 years 8 months ago
Making sense of strangers' expertise from signals in digital artifacts
Contemporary work increasingly involves interacting with strangers in technology-mediated environments. In this context, we come to rely on digital artifacts to infer characterist...
N. Sadat Shami, Kate Ehrlich, Geri Gay, Jeffrey T....
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...