Sciweavers

411 search results - page 70 / 83
» Technological Strategy of Using Global Positioning System: A...
Sort
View
IJMMS
2007
173views more  IJMMS 2007»
13 years 8 months ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
CP
2010
Springer
13 years 7 months ago
A Box-Consistency Contractor Based on Extremal Functions
Abstract. Interval-based methods can approximate all the real solutions of a system of equations and inequalities. The Box interval constraint propagation algorithm enforces Box co...
Gilles Trombettoni, Yves Papegay, Gilles Chabert, ...
ICSE
1999
IEEE-ACM
14 years 1 months ago
CHIME: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments
Source code browsing is an important part of program comprehension. Browsers expose semantic and syntactic relationships (such as between object references and definitions) in GU...
Premkumar T. Devanbu, Yih-Farn Chen, Emden R. Gans...
CLEF
2007
Springer
14 years 3 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 3 months ago
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching fo...
Corlane Barclay, Evan W. Duggan