Sciweavers

732 search results - page 56 / 147
» What Is It Like to Be a Rat
Sort
View
CISS
2010
IEEE
12 years 11 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
ISMIR
2000
Springer
146views Music» more  ISMIR 2000»
13 years 11 months ago
Perceptual and Cognitive Applications in Music Information Retrieval
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
David Huron
CORR
2006
Springer
180views Education» more  CORR 2006»
13 years 7 months ago
Social Networks and Social Information Filtering on Digg
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Kristina Lerman
ICWSM
2009
13 years 5 months ago
MakeMyPage: Social Media Meets Automatic Content Generation
Finding out about a topic online can be time consuming. It involves visiting multiple news sites, encyclopedia entries, video repositories and other resources while discarding irr...
Francisco Iacobelli, Kristian J. Hammond, Larry Bi...
TOOLS
2008
IEEE
14 years 2 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...