Sciweavers

1005 search results - page 175 / 201
» Practical Secure Function Evaluation
Sort
View
CORR
2010
Springer
241views Education» more  CORR 2010»
13 years 7 months ago
Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image
With the increasing growth of technology and the entrance into the digital age, we have to handle a vast amount of information every time which often presents difficulties. So, the...
Kamrul Hasan Talukder, Koichi Harada
DATAMINE
2006
139views more  DATAMINE 2006»
13 years 7 months ago
VizRank: Data Visualization Guided by Machine Learning
Data visualization plays a crucial role in identifying interesting patterns in exploratory data analysis. Its use is, however, made difficult by the large number of possible data p...
Gregor Leban, Blaz Zupan, Gaj Vidmar, Ivan Bratko
ISEM
2008
129views more  ISEM 2008»
13 years 7 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
PR
2006
88views more  PR 2006»
13 years 7 months ago
Directional features in online handwriting recognition
The selection of valuable features is crucial in pattern recognition. In this paper we deal with the issue that part of features originate from directional instead of common linea...
Claus Bahlmann
IJCINI
2007
112views more  IJCINI 2007»
13 years 7 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer