Sciweavers

228 search results - page 33 / 46
» Researchers' e-journal use and information seeking behaviour
Sort
View
PST
2004
13 years 9 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
ECIR
2010
Springer
13 years 9 months ago
Enabling Interactive Query Expansion through Eliciting the Potential Effect of Expansion Terms
Despite its potential to improve search effectiveness, previous research has shown that the uptake of interactive query expansion (IQE) is limited. In this paper, we investigate on...
Nuzhah Gooda Sahib, Anastasios Tombros, Ian Ruthve...
GRAPHICSINTERFACE
2008
13 years 9 months ago
Towards a model human cochlea: sensory substitution for crossmodal audio-tactile displays
We present a Model Human Cochlea (MHC): a sensory substitution technique for creating a crossmodal audio-touch display. This research is aimed at designing a chair-based interface...
Maria Karam, Frank A. Russo, Carmen Branje, Emily ...
DAGSTUHL
2004
13 years 9 months ago
Simplicity Considered Fundamental to Design for Predictability
Complexity is the core problem of contemporary information technology, as the "artificial complicatedness" of its artefacts is exploding. Intellectually easy and economic...
Wolfgang A. Halang
KDD
2012
ACM
188views Data Mining» more  KDD 2012»
11 years 10 months ago
A probabilistic model for multimodal hash function learning
In recent years, both hashing-based similarity search and multimodal similarity search have aroused much research interest in the data mining and other communities. While hashing-...
Yi Zhen, Dit-Yan Yeung