Sciweavers

451 search results - page 59 / 91
» Constrained Sums of Information Systems
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 2 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
14 years 2 months ago
Using Agile Practices to Spark Innovation in a Small to Medium Sized Business
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...
Ken H. Judy, Ilio Krumins-Beens
IPSN
2005
Springer
14 years 2 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
DAGSTUHL
2003
13 years 10 months ago
Preset based interaction with high dimensional parameter spaces
Many systems require the setting of a large number of parameters. This is often a difficult and time consuming task, especially for novice users. A framework is presented to simp...
Jarke J. van Wijk, Cornelius W. A. M. van Overveld
CORR
2007
Springer
85views Education» more  CORR 2007»
13 years 8 months ago
Interface groups and financial transfer architectures
Analytic execution architectures have been proposed by the same authors as a means to conceptualize the cooperation between heterogeneous collectives of components such as program...
Jan A. Bergstra, Alban Ponse