Sciweavers

14235 search results - page 2763 / 2847
» Is computer science science
Sort
View
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
15 years 9 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
140
Voted
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
15 years 9 months ago
Market Structure and the Predictability of Electricity System Line Flows: An Experimental Analysis
Robert Thomas has shown, using simulations of experimental results, that the power flow on any line in an electric network is linearly proportional to the total system load when t...
Nodir Adilov, Thomas Light, Richard E. Schuler, Wi...
145
Voted
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
15 years 9 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
108
Voted
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 9 months ago
Strategic Versus Tactical Design
Abstract. We seek to distinguish Strategic design decisions (e.g., to adopt a programming paradigm, architectural style, CBSE standard or application framework) from tactical desig...
Amnon H. Eden
118
Voted
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
15 years 9 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
« Prev « First page 2763 / 2847 Last » Next »