Sciweavers

26354 search results - page 183 / 5271
» How we refactor, and how we know it
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
BCSHCI
2007
14 years 6 days ago
How effective is it to design by voice?
Previous studies on usability of crowded graphical interfaces that are full of widgets like menus, buttons, palette-tools etc, have shown evidence that they create a fertile envir...
Mohammad M. Alsuraihi, Dimitris I. Rigas
ENTCS
2006
116views more  ENTCS 2006»
13 years 10 months ago
How Recent is a Web Document?
One of the most important aspects of a Web document is its up-to-dateness or recency. Up-to-dateness is particularly relevant to Web documents because they usually contain content...
Bo Hu, Florian Lauck, Jan Scheffczyk
CPHYSICS
2004
85views more  CPHYSICS 2004»
13 years 10 months ago
Beyond benchmarking - how experiments and simulations can work together in plasma physics
There has been dramatic progress in the scope and power of plasma simulations in recent years; and because codes are generally cheaper to write, to run and to diagnose than experi...
Martin Greenwald
NAACL
2010
13 years 8 months ago
From Baby Steps to Leapfrog: How "Less is More" in Unsupervised Dependency Parsing
We present three approaches for unsupervised grammar induction that are sensitive to data complexity and apply them to Klein and Manning's Dependency Model with Valence. The ...
Valentin I. Spitkovsky, Hiyan Alshawi, Daniel Jura...