Sciweavers

6320 search results - page 999 / 1264
» Towards Situated Computing
Sort
View
JEI
2008
128views more  JEI 2008»
15 years 4 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
PUC
2008
117views more  PUC 2008»
15 years 4 months ago
Designing for privacy and self-presentation in social awareness
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown ...
Mika Raento, Antti Oulasvirta
CCS
2010
ACM
15 years 3 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 3 months ago
Scheduling Periodic Real-Time Tasks with Heterogeneous Reward Requirements
—We study the problem of scheduling periodic real-time tasks which have individual minimum reward requirements. We consider situations where tasks generate jobs that can be provi...
I-Hong Hou, P. R. Kumar
156
Voted
JCC
2008
99views more  JCC 2008»
15 years 3 months ago
Assessment of programs for ligand binding affinity prediction
: The prediction of the binding free energy between a ligand and a protein is an important component in the virtual screening and lead optimization of ligands for drug discovery. T...
Ryangguk Kim, Jeffrey Skolnick