Sciweavers

13224 search results - page 2389 / 2645
» Self-monitoring for Computer Users
Sort
View
ADHOCNOW
2003
Springer
14 years 3 months ago
A Uniform Continuum Model for Scaling of Ad Hoc Networks
This paper models an ad-hoc network as a continuum of nodes, ignoring edge effects, to find how the traffic scales with N, the number of nodes. We obtain expressions for the traffi...
Ernst W. Grundke, A. Nur Zincir-Heywood
AMEC
2003
Springer
14 years 3 months ago
Automated Negotiation and Bundling of Information Goods
In this paper, we present a novel system for selling bundles of news items. Through the system, customers bargain with the seller over the price and quality of the delivered goods...
D. J. A. Somefun, Enrico Gerding, Sander M. Bohte,...
APPT
2003
Springer
14 years 3 months ago
Optimal Broadcast Channel for Data Dissemination in Mobile Database Environment
The increase number of mobile users in wireless environment affects query access time substantially. To minimise the query access time, one possible way is to employ data broadcast...
Agustinus Borgy Waluyo, Bala Srinivasan, David Tan...
AUSAI
2003
Springer
14 years 3 months ago
Information Extraction via Path Merging
Abstract. In this paper, we describe a new approach to information extraction that neatly integrates top-down hypothesis driven information with bottom-up data driven information. ...
Robert Dale, Cécile Paris, Marc Tilbrook
AVBPA
2003
Springer
190views Biometrics» more  AVBPA 2003»
14 years 3 months ago
Combining Face and Iris Biometrics for Identity Verification
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
Yunhong Wang, Tieniu Tan, Anil K. Jain
« Prev « First page 2389 / 2645 Last » Next »