Sciweavers

2244 search results - page 352 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
SIMUTOOLS
2008
13 years 11 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
WIOPT
2010
IEEE
13 years 8 months ago
Minimizing transmission energy in sensor networks via trajectory control
—Energy optimization is a significant component of Wireless Sensor Network (WSN) design. In this paper we consider transmission energy optimization in WSNs where messages are co...
Delia Ciullo, Guner D. Celik, Eytan Modiano
CSCW
2010
ACM
14 years 7 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
CHI
2010
ACM
14 years 5 months ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan
ICIAR
2005
Springer
14 years 3 months ago
On the Individuality of the Iris Biometric
We consider quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distingui...
Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yill...