Sciweavers

11588 search results - page 2204 / 2318
» Will They Like This
Sort
View
IJDAR
2007
69views more  IJDAR 2007»
13 years 9 months ago
User-driven page layout analysis of historical printed books
In this paper, based on the study of the specificity of historical printed books, we first explain the main error sources in classical methods used for page layout analysis. We sho...
Jean-Yves Ramel, S. Leriche, M. L. Demonet, S. Bus...
IJDE
2007
123views more  IJDE 2007»
13 years 9 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
IJET
2007
121views more  IJET 2007»
13 years 9 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis
AAI
2005
166views more  AAI 2005»
13 years 9 months ago
Interactive Knowledge Construction in the Collaborative Building of an Encyclopedia
1 One of the major challenges of Applied Artificial Intelligence is to provide environments where high level human activities like learning, constructing theories or performing exp...
Philippe Lemoisson, Stefano A. Cerri
« Prev « First page 2204 / 2318 Last » Next »