Sciweavers

7504 search results - page 284 / 1501
» Computing with Action Potentials
Sort
View
114
Voted
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 9 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
IROS
2008
IEEE
131views Robotics» more  IROS 2008»
15 years 9 months ago
Deformations of general parametric shells: Computation and robot experiment
— A shell is a body enclosed between two closely spaced and curved surfaces. Classical theory of shells [38], [33], [16] assumes a parametrization along the lines of principal cu...
Yan-Bin Jia, Jiang Tian
131
Voted
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 9 months ago
Fine-Tuning the Human-Computer Interface: Verbal versus Keyboard Input in an Idea Generation Context
Voice recognition technologies are rapidly evolving to help humans interact with computers more efficiently and effectively. Despite their potential advantages, their impact on sy...
Jay J. H. Jung, Clayton A. Looney, Joseph S. Valac...
94
Voted
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 9 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
110
Voted
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 9 months ago
A Computational Approach to Style in American Poetry
We develop a quantitative method to assess the style of American poems and to visualize a collection of poems in relation to one another. Qualitative poetry criticism helped guide...
David M. Kaplan, David M. Blei