Sciweavers

13895 search results - page 2744 / 2779
» Exploring
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 2 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
IALP
2010
13 years 2 months ago
Sentence Similarity-Based Source Context Modelling in PBSMT
Target phrase selection, a crucial component of the state-of-the-art phrase-based statistical machine translation (PBSMT) model, plays a key role in generating accurate translation...
Rejwanul Haque, Sudip Kumar Naskar, Andy Way, Mart...
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
IJIDE
2010
152views more  IJIDE 2010»
13 years 2 months ago
Digital Divide in India: Measurement, Determinants and Policy for Addressing the Challenges in Bridging the Digital Divide
: In the recent years, the notion of `digital divide' has been widely researched, and has attracted much debate and speculation for its economic, social and political conseque...
Sumanjeet Singh
ISEMANTICS
2010
13 years 2 months ago
Towards the formalization of interaction semantics
With the advent of Web 2.0 and the emergence of improved technologies to enhance UI, the importance of user experience and intuitiveness of Web interfaces led to the growth and su...
Irene Celino, Francesco Corcoglioniti
« Prev « First page 2744 / 2779 Last » Next »