Sciweavers

2276 search results - page 405 / 456
» The Measurement of Business Intelligence
Sort
View
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 10 months ago
The Gaussian Multiple Access Wire-Tap Channel
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intellige...
Ender Tekin, Aylin Yener
JTAER
2008
80views more  JTAER 2008»
13 years 10 months ago
Web 2.0 as Syndication
There is considerable excitement about the notion of 'Web 2.0', particularly among Internet businesspeople. In contrast, there is an almost complete lack of formal liter...
Roger Clarke
SIGIR
2008
ACM
13 years 9 months ago
Latent dirichlet allocation based multi-document summarization
Extraction based Multi-Document Summarization Algorithms consist of choosing sentences from the documents using some weighting mechanism and combining them into a summary. In this...
Rachit Arora, Balaraman Ravindran
AROBOTS
2005
114views more  AROBOTS 2005»
13 years 9 months ago
Visually Guided Cooperative Robot Actions Based on Information Quality
In field environments it is not usually possible to provide robots in advance with valid geometric models of its environment and task element locations. The robot or robot teams ne...
Vivek A. Sujan, Steven Dubowsky
TKDE
2008
103views more  TKDE 2008»
13 years 9 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...