Sciweavers

524 search results - page 87 / 105
» Why phishing works
Sort
View
ETS
2002
IEEE
155views Hardware» more  ETS 2002»
13 years 9 months ago
The experience of practitioners with technology-enhanced teaching and learning
This paper describes a research project, which seeks to showcase the experience base of practitioners with technology-enhanced teaching and learning. A particular focus of this in...
Som Naidu, David Cunnington, Carol Jasen
CACM
1998
127views more  CACM 1998»
13 years 9 months ago
The Virtual Reality Modeling Language and Java
Abstract. The Virtual Reality Modeling Language (VRML) and Java provide a standardized, portable and platformindependent way to render dynamic, interactive 3D scenes across the Int...
Donald P. Brutzman
ML
2010
ACM
127views Machine Learning» more  ML 2010»
13 years 8 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby

Book
363views
15 years 8 months ago
Computational Linguistics: Models, Resources, Applications
"Can computers meaningfully process human language? If this is difficult, why? If this is possible, how? This book introduces the reader to the fascinating science of computat...
Igor A. Bolshakov and Alexander Gelbukh
CVPR
2006
IEEE
14 years 11 months ago
Clustering Appearance for Scene Analysis
We propose a new approach called "appearance clustering" for scene analysis. The key idea in this approach is that the scene points can be clustered according to their s...
Sanjeev J. Koppal, Srinivasa G. Narasimhan