Sciweavers

993 search results - page 144 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
EUROSYS
2009
ACM
15 years 7 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
ICANN
1997
Springer
15 years 6 months ago
Local Subspace Classifier
Subsystems for on-line recognition of handwriting are needed in personal digital assistants (PDAs) and other portable handheld devices. We have developed a recognition system whic...
Jorma Laaksonen
ESWA
2006
117views more  ESWA 2006»
15 years 3 months ago
A knowledge-based approach to assign breast cancer treatments in oncology units
The aim of this work is to present a developed knowledge-based approach for breast cancer treatment. This Decision Support System (DSS) uses an incremental knowledge acquisition t...
Teddy G. Miranda-Mena, Sandra L. Benítez U....
CHI
2009
ACM
16 years 3 months ago
Making sense of strangers' expertise from signals in digital artifacts
Contemporary work increasingly involves interacting with strangers in technology-mediated environments. In this context, we come to rely on digital artifacts to infer characterist...
N. Sadat Shami, Kate Ehrlich, Geri Gay, Jeffrey T....
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...