Sciweavers

6884 search results - page 105 / 1377
» The macro-structure of use of help
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 9 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
ECIS
2004
13 years 9 months ago
Inserting ICT and IS in a complex organisational environment using an organisational learning model
Within the last few years, knowledge management has become one of the hottest subjects among organisational and information systems theorists and practitioners. Many find in it an...
Silvina Santana
DICTA
2003
13 years 9 months ago
Real-time Surveillance System by Use of the Face Understanding Technologies
This paper introduced a human surveillance system which integrated the face understanding technologies to recognize personal identities in real time. We proposed a coarse-to-fine s...
Yi-Tsung Chien, Yea-Shuan Huang, Sheng-Wen Jeng, Y...
IJCAI
2003
13 years 9 months ago
Improving the Performance of Recommender Systems That Use Critiquing
Personalization actions that tailor the Web experience to a particular user are an integral component of recommender systems. Here, product knowledge - either hand-coded or “mine...
Lorraine McGinty, Barry Smyth
WSC
2004
13 years 9 months ago
Optimization of Traffic Signal Light Timing Using Simulation
Traffic congestion is one of the worst problems in many countries. Traffic congestion wastes a huge portion of the national income for fuel and traffic-related environmental and s...
Kasun N. Hewage, Janaka Yasantha Ruwanpura