Sciweavers

5829 search results - page 1156 / 1166
» The Practice of Cluster Analysis
Sort
View
PUC
2007
90views more  PUC 2007»
13 years 7 months ago
Digital homes on wheels: designing for the unimagined home
Design for the digital home is often predicated on an ideal, imagined domestic space that is expansive, stable, occupied by a ‘‘busy’’ nuclear family, and does not always m...
Alexandra Zafiroglu, Michele Chang
ESWA
2010
154views more  ESWA 2010»
13 years 6 months ago
Robust speech interaction in motorcycle environment
Aiming at robust spoken dialogue interaction in motorcycle environment, we investigate various configurations for a speech front-end, which consists of speech pre-processing, spee...
Iosif Mporas, Otilia Kocsis, Todor Ganchev, Nikos ...
GIS
2010
ACM
13 years 6 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
IS
2010
13 years 6 months ago
Extracting a largest redundancy-free XML storage structure from an acyclic hypergraph in polynomial time
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free ...
Wai Yin Mok, Joseph Fong, David W. Embley
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
« Prev « First page 1156 / 1166 Last » Next »