Sciweavers

1615 search results - page 102 / 323
» Dark application communities
Sort
View
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 10 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
138
Voted
ICITA
2005
IEEE
15 years 10 months ago
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would I
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
JUCS
2006
135views more  JUCS 2006»
15 years 4 months ago
Visualization Services in a Conference Context: An Approach by RFID Technology
: Ambient Intelligent (AmI) vision is a new concept materialized by the Six Framework Program of the European Community. It involves three key technologies: Ubiquitous Computing, U...
José Bravo, Ramón Hervás, Ino...
ICWE
2004
Springer
15 years 10 months ago
Getting Ready Web Engineering Methods for the Semantic Web
Current Web Engineering methods develop "closed" web applications from conceptual models. This fact makes difficult the integration and the interoperability of different ...
Victoria Torres, Joan Fons, Oscar Asensi, Vicente ...
IADIS
2004
15 years 6 months ago
Challenges for Network Computer Games
Interactive entertainment and specifically computer games has grown into a multi-billion industry in the last few years and continues to grow. This expansion has fueled a number o...
Yusuf Pisan