Sciweavers

14829 search results - page 15 / 2966
» How Many Different
Sort
View
IRI
2007
IEEE
15 years 8 months ago
Comparative Analysis of Different Text Segmentation Algorithms on Arabic News Stories
The task of text segmentation represents an important step in many applications and while much work has been carried out to address this task for the English language, work on tex...
Michael A. El-Shayeb, Samhaa R. El-Beltagy, Ahmed ...
126
Voted
INTERACT
2003
15 years 3 months ago
Managing one's Social Network: Does Age Make a Difference?
: Keeping in touch with family and friends should be easier now that we have a repertoire of communication tools available to us (e.g. SMS, IM, email, mobile and landline phones). ...
Hilary Smith, Yvonne Rogers, Mark Brady
112
Voted
CORR
2006
Springer
138views Education» more  CORR 2006»
15 years 2 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
196
Voted
APVIS
2011
14 years 2 months ago
Exploring geo-temporal differences using GTdiff
Many data sets exist that contain both geospatial and temporal elements. Within such data sets, it can be difficult to determine how the data have changed over spatial and tempor...
Orland Hoeber, Garnett Carl Wilson, Simon Harding,...
USENIX
2001
15 years 3 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson