Sciweavers

11740 search results - page 2280 / 2348
» More Problems in Rewriting
Sort
View
IJSI
2008
156views more  IJSI 2008»
13 years 8 months ago
Co-Training by Committee: A Generalized Framework for Semi-Supervised Learning with Committees
Many data mining applications have a large amount of data but labeling data is often difficult, expensive, or time consuming, as it requires human experts for annotation. Semi-supe...
Mohamed Farouk Abdel Hady, Friedhelm Schwenker
CGF
2007
101views more  CGF 2007»
13 years 8 months ago
Consistent Viewing and Interaction for Multiple Users in Projection-Based VR Systems
In projection-based Virtual Reality (VR) systems, typically only one headtracked user views stereo images rendered from the correct view position. For other users, who are present...
Gerwin de Haan, Rene Molenaar, Michal Koutek, Frit...
INFSOF
2008
201views more  INFSOF 2008»
13 years 8 months ago
Motivation in Software Engineering: A systematic literature review
Objective: In this paper, we present a systematic literature review of motivation in Software Engineering. The objective of this review is to plot the landscape of current reporte...
Sarah Beecham, Nathan Baddoo, Tracy Hall, Hugh Rob...
IOR
2008
128views more  IOR 2008»
13 years 8 months ago
Promised Lead-Time Contracts Under Asymmetric Information
We study the important problem of how a supplier should optimally share the consequences of demand uncertainty (i.e., the cost of inventory excesses and shortages) with a retailer...
Holly Lutze, Özalp Özer
COMCOM
2007
100views more  COMCOM 2007»
13 years 8 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
« Prev « First page 2280 / 2348 Last » Next »