Sciweavers

2715 search results - page 529 / 543
» Database Publication Practices
Sort
View
BIBE
2006
IEEE
138views Bioinformatics» more  BIBE 2006»
14 years 3 months ago
Assigning Schema Labels Using Ontology And Hueristics
Bioinformatics data is growing at a phenomenal rate. Besides the exponential growth of individual databases, the number of data depositories is increasing too. Because of the comp...
Xuan Zhang, Ruoming Jin, Gagan Agrawal
ITNG
2006
IEEE
14 years 3 months ago
Overlap Among Major Web Search Engines
Purpose – This paper reports the findings of a major study examining the overlap among results retrieved by three major web search engines. The goal of the research was to: mea...
Amanda Spink, Bernard J. Jansen, Chris Blakely, Sh...
ASSETS
2006
ACM
14 years 3 months ago
American sign language recognition in game development for deaf children
CopyCat is an American Sign Language (ASL) game, which uses gesture recognition technology to help young deaf children practice ASL skills. We describe a brief history of the game...
Helene Brashear, Valerie L. Henderson, Kwang-Hyun ...
HRI
2006
ACM
14 years 3 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati
SACMAT
2006
ACM
14 years 2 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino