Sciweavers

271 search results - page 52 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
IADT
1998
148views more  IADT 1998»
13 years 9 months ago
A Tool for Content-Based Image Retrieval in Object-Oriented Databases
Conventional image processing algorithms used to compare images are very timeconsuming, making them inappropriate for use in searching for an image in a huge collection of images ...
Caetano Traina Jr., Agma J. M. Traina, Rildo R. do...
ALMOB
2007
133views more  ALMOB 2007»
13 years 7 months ago
Characteristics of predictor sets found using differential prioritization
Background: Feature selection plays an undeniably important role in classification problems involving high dimensional datasets such as microarray datasets. For filter-based featu...
Chia Huey Ooi, Madhu Chetty, Shyh Wei Teng
EJIS
2010
52views more  EJIS 2010»
13 years 7 months ago
Same technology, different outcome? Reinterpreting Barley's Technology as an Occasion for Structuring
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
Starling David Hunter III
CPHYSICS
2004
87views more  CPHYSICS 2004»
13 years 7 months ago
Vlasov simulations on an adaptive phase-space grid
We introduce here a new method for the numerical resolution of the Vlasov equation on a phase space grid using an adaptive semi-Lagrangian method. The adaptivity is obtained throu...
Michael Gutnic, Matthieu Haefele, I. Paun, Eric So...
INFOCOM
2012
IEEE
11 years 10 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...