Sciweavers

1615 search results - page 310 / 323
» Dark application communities
Sort
View
IADIS
2004
13 years 9 months ago
Using Ontologies to Build Virtual Worlds for the Web
Today, the development of a VR application is still a long and difficult task. You need to be skilled in Virtual Reality (VR) technology to be able to develop a Virtual World. The...
Wesley Bille, Olga De Troyer, Frederic Kleinermann...
IADIS
2003
13 years 9 months ago
Internet Geography: New Spaces of Information
The objective of great investments in telecommunication networks is to approach economies and put an end to the asymmetries. The most isolated regions could be the beneficiaries o...
Jorge Ricardo da Costa Ferreira
USENIX
2004
13 years 9 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
NAACL
2003
13 years 9 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
NIPS
2000
13 years 9 months ago
One Microphone Source Separation
Source separation, or computational auditory scene analysis, attempts to extract individual acoustic objects from input which contains a mixture of sounds from different sources, ...
Sam T. Roweis