Sciweavers

11718 search results - page 2131 / 2344
» Testing database applications
Sort
View
IJIM
2007
139views more  IJIM 2007»
13 years 8 months ago
Evaluation Methods on Usability of M-Learning Environments
— Nowadays there are different evaluation methods focused in the assessment of the usability of telematic methods. The assessment of 3rd generation web environments evaluates the...
Teresa Magal Royo, Guillermo Peris-Fajarnés...
SPE
2008
108views more  SPE 2008»
13 years 8 months ago
Effective asymmetric XML compression
The innate verbosity of the Extensible Markup Language remains one of its main weaknesses, especially when large XML documents are concerned. This problem can be solved with the a...
Przemyslaw Skibinski, Szymon Grabowski, Jakub Swac...
AMC
2005
191views more  AMC 2005»
13 years 8 months ago
Model identification of ARIMA family using genetic algorithms
ARIMA is a popular method to analyze stationary univariate time series data. There are usually three main stages to build an ARIMA model, including model identification, model est...
Chorng-Shyong Ong, Jih-Jeng Huang, Gwo-Hshiung Tze...
TEC
2008
104views more  TEC 2008»
13 years 8 months ago
Coevolution of Fitness Predictors
Abstract--We present an algorithm that coevolves fitness predictors, optimized for the solution population, which reduce fitness evaluation cost and frequency, while maintaining ev...
Michael D. Schmidt, Hod Lipson
IVC
2007
266views more  IVC 2007»
13 years 8 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
« Prev « First page 2131 / 2344 Last » Next »