Sciweavers

364 search results - page 39 / 73
» Discovering Hidden Evidence
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
AAAI
2004
13 years 10 months ago
Hiding Satisfying Assignments: Two Are Better than One
The evaluation of incomplete satisfiability solvers depends critically on the availability of hard satisfiable instances. A plausible source of such instances consists of random k...
Dimitris Achlioptas, Haixia Jia, Cristopher Moore
ECIS
2001
13 years 10 months ago
Critical Information Systems Research: A Habermasian Approach
The paper presents a critical inquiry into the relationship between Computer-Mediated Communication (CMC) and progressive rationalisation in modern organisations. By drawing on th...
Dubravka Cecez-Kecmanovic
BIB
2006
141views more  BIB 2006»
13 years 8 months ago
Statistical significance in biological sequence analysis
One of the major goals of computational sequence analysis is to find sequence similarities, which could serve as evidence of structural and functional conservation, as well as of ...
Alexander Yu. Mitrophanov, Mark Borodovsky
ENGL
2007
107views more  ENGL 2007»
13 years 8 months ago
Pixel Fusion Based Curvelets and Wavelets Denoise Algorithm
—Curvelets denoise approach has been widely used in many fields for its ability to obtain high quality result images. However artifacts those appear in the result images of curve...
Liyong Ma, Jiachen Ma, Yi Shen