Sciweavers

1663 search results - page 255 / 333
» Computer Security in the Real World
Sort
View
129
Voted
ICDM
2008
IEEE
108views Data Mining» more  ICDM 2008»
15 years 10 months ago
Non-negative Matrix Factorization on Manifold
Recently Non-negative Matrix Factorization (NMF) has received a lot of attentions in information retrieval, computer vision and pattern recognition. NMF aims to find two non-nega...
Deng Cai, Xiaofei He, Xiaoyun Wu, Jiawei Han
135
Voted
IV
2008
IEEE
145views Visualization» more  IV 2008»
15 years 10 months ago
Beyond the Tyranny of the Pixel: Exploring the Physicality of Information Visualization
This paper consists of a review of contemporary that map and materialize abstract data as physical artifacts. With computing technology and the access of information influencing e...
Andrew Vande Moere
RAM
2008
IEEE
137views Robotics» more  RAM 2008»
15 years 10 months ago
Middleware for Robotics: A Survey
—The field of robotics relies heavily on various technologies such as mechatronics, computing systems, and wireless communication. Given the fast growing technological progress i...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar
141
Voted
HAPTICS
2007
IEEE
15 years 10 months ago
Surface Interrogation Methods for Haptic Rendering of Virtual Objects
The process which enables virtual objects to mimic their real world counterparts is known as realistic rendering in haptics. Realistic sensations could relate to any spatial featu...
Anusha Sridaran, Dianne Hansford, Kanav Kahol, Set...
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...