Sciweavers

7984 search results - page 1374 / 1597
» Exploring personal information
Sort
View
122
Voted
RE
2006
Springer
15 years 3 months ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa
134
Voted
IJCV
2007
211views more  IJCV 2007»
15 years 3 months ago
The CLEF 2005 Automatic Medical Image Annotation Task
In this paper, the automatic annotation task of the 2005 CLEF cross-language image retrieval campaign (ImageCLEF) is described. This paper focuses on the database used, the task s...
Thomas Deselaers, Henning Müller, Paul Clough...
125
Voted
TASLP
2008
101views more  TASLP 2008»
15 years 3 months ago
Speaker Identification Using Instantaneous Frequencies
This work presents an experimental evaluation of different features for use in speaker identification. The features are tested using speech data provided by the CHAINS corpus, in a...
Marco Grimaldi, Fred Cummins
128
Voted
AROBOTS
2005
98views more  AROBOTS 2005»
15 years 3 months ago
Terrain Classification Using Weakly-Structured Vehicle/Terrain Interaction
We present a new terrain classification technique both for effective, autonomous locomotion over rough, unknown terrains and for the qualitative analysis of terrains for exploratio...
Amy C. Larson, Guleser K. Demir, Richard M. Voyles
CCR
2005
64views more  CCR 2005»
15 years 3 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
« Prev « First page 1374 / 1597 Last » Next »