In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi-cally on the role of user mobility. We describe the results of an empirical study ...
In this paper, we study instances of complex neural networks, i.e. neural networks with complex topologies. We use Self-Organizing Map neural networks whose neighborhood relations...
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Many readers annotate passages that are important to their work. If we understand the relationship between the types of marks on a passage and the passage’s ultimate utility in a...
Frank M. Shipman III, Morgan N. Price, Catherine C...
sets of research abstracts that may be retrieved by a digital library or search engine in response to a user query. y dissertation abstracts were selected as the sample domain in t...
Shiyan Ou, Christopher S. G. Khoo, Dion Hoe-Lian G...