Sciweavers

5254 search results - page 929 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
DIM
2009
ACM
14 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ACML
2009
Springer
14 years 2 months ago
Learning Algorithms for Domain Adaptation
A fundamental assumption for any machine learning task is to have training and test data instances drawn from the same distribution while having a sufficiently large number of tra...
Manas A. Pathak, Eric Nyberg
CT
2001
Springer
14 years 2 months ago
Cognitive Dimensions of Notations: Design Tools for Cognitive Technology
The Cognitive Dimensions of Notations framework has been created to assist the designers of notational systems and information artifacts to evaluate their designs with respect to t...
Alan F. Blackwell, Carol Britton, Anna Louise Cox,...
SIGGRAPH
2010
ACM
14 years 2 months ago
Apparent display resolution enhancement for moving images
Limited spatial resolution of current displays makes the depiction of very fine spatial details difficult. This work proposes a novel method applied to moving images that takes ...
Piotr Didyk, Elmar Eisemann, Tobias Ritschel, Karo...
ISCC
2000
IEEE
14 years 2 months ago
On Multiple Traffic Type Integration over Wireless TDMA Channels
A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the ...
Polychronis Koutsakis, Michael Paterakis