Sciweavers

1466 search results - page 246 / 294
» Completeness of the Authentication Tests
Sort
View
WORDS
2005
IEEE
14 years 1 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
IBPRIA
2005
Springer
14 years 1 months ago
Monte Carlo Localization Using SIFT Features
The ability of finding its situation in a given environment is crucial for an autonomous agent. While navigating through a space, a mobile robot must be capable of finding its lo...
Arturo Gil, Óscar Reinoso, Maria Asunci&oac...
ECLIPSE
2004
ACM
14 years 1 months ago
An Eclipse-based course project snapshot and submission system
Much research has been done on techniques to teach students how to program. However, it is usually difficult to quantify exactly how students work. Instructors typically only see ...
Jaime Spacco, David Hovemeyer, William Pugh
CHI
2003
ACM
14 years 1 months ago
Breakingstory: visualizing change in online news
BreakingStory is an interactive system for visualizing change in online news. The system regularly collects the text from the front pages of international daily news web sites. It...
Jean Anne Fitzpatrick, James Reffell, Moryma Aydel...
ADC
2003
Springer
182views Database» more  ADC 2003»
14 years 1 months ago
CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth
Discovering association rules that identify relationships among sets of items is an important problem in data mining. Finding frequent item sets is computationally the most expens...
Yudho Giri Sucahyo, Raj P. Gopalan