Sciweavers

2411 search results - page 416 / 483
» The challenge of information visualization evaluation
Sort
View
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
15 years 3 months ago
Modeling and decision making in spatio-temporal processes for environmental surveillance
Abstract— The need for efficient monitoring of spatiotemporal dynamics in large environmental surveillance applications motivates the use of robotic sensors to achieve sufficie...
Amarjeet Singh 0003, Fabio Ramos, Hugh D. Whyte, W...
IJAR
2010
153views more  IJAR 2010»
15 years 3 months ago
Diagnosis of dyslexia with low quality data with genetic fuzzy systems
For diagnosing dyslexia in early childhood, children have to solve non-writing based, graphical tests. Curently, these tests are processed by a human expert; applying artificial ...
Ana M. Palacios, Luciano Sánchez, Iné...
INFOCOM
2010
IEEE
15 years 3 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
SEKE
2010
Springer
15 years 2 months ago
A Project Monitoring Cockpit Based On Integrating Data Sources in Open Source Software Development
— Many open source software (OSS) development projects use tools and models that come from heterogeneous sources. A project manager, who wants to analyze indicators for the state...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 2 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias