Sciweavers

978 search results - page 173 / 196
» Developing a Common Operating Environment for Military Appli...
Sort
View
97
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Detection of targets embedded in multipath clutter with Time Reversal
—Detection of targets in complex environments is of importance in both radar and sonar applications. Recent work has shown that the use of Time Reversal (TR) techniques improves ...
Nicholas O'Donoughue, Joel Harley, José M. ...
INFOCOM
2006
IEEE
15 years 9 months ago
Mistreatment in Distributed Caching Groups: Causes and Implications
— Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the...
Nikolaos Laoutaris, Georgios Smaragdakis, Azer Bes...
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
16 years 4 months ago
Distance Based Indexing for String Proximity Search
In many database applications involving string data, it is common to have near neighbor queries (asking for strings that are similar to a query string) or nearest neighbor queries...
Jai Macker, Murat Tasan, Süleyman Cenk Sahina...
141
Voted
DMIN
2006
131views Data Mining» more  DMIN 2006»
15 years 4 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
ACMDIS
2006
ACM
15 years 9 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...