Sciweavers

5511 search results - page 907 / 1103
» Security for Network Places
Sort
View
CHI
2011
ACM
14 years 7 months ago
Effect of MobileASL on communication among deaf users
MobileASL, a software program enabling sign-language video on mobile devices over conventional U.S. cellular networks, was evaluated in a three-week field study during the summer ...
Joy Kim, Jessica J. Tran, Tressa W. Johnson, Richa...
PRL
2011
14 years 7 months ago
A Bayes-true data generator for evaluation of supervised and unsupervised learning methods
Benchmarking pattern recognition, machine learning and data mining methods commonly relies on real-world data sets. However, there are some disadvantages in using real-world data....
Janick V. Frasch, Aleksander Lodwich, Faisal Shafa...
130
Voted
CLEF
2010
Springer
15 years 5 months ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
CSCW
2012
ACM
13 years 11 months ago
Coordination and beyond: social functions of groups in open content production
We report on a study of the English edition of Wikipedia in which we used a mixed methods approach to understand how nested organizational structures called WikiProjects support c...
Andrea Forte, Niki Kittur, Vanessa Larco, Haiyi Zh...
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham