Sciweavers

12459 search results - page 2479 / 2492
» cans 2006
Sort
View
ISI
2006
Springer
13 years 7 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
JMM2
2008
82views more  JMM2 2008»
13 years 7 months ago
Typhoon Locating and Reconstruction from the Infrared Satellite Cloud Image
Typhoon inflicts terrible damage due to thunderstorms, violent winds, torrential rain, flooding and extreme high tides. Improving the early typhoon forecast capability is important...
Tsang-Long Pao, Jun-Heng Yeh
DKE
2007
82views more  DKE 2007»
13 years 7 months ago
Eliciting information for product modeling using process modeling
A product model is a formal and structured definition of product information. The most common procedure for defining a product data model is to first describe the business and/...
Ghang Lee, Charles M. Eastman, Rafael Sacks
DSS
2007
113views more  DSS 2007»
13 years 7 months ago
An associate constraint network approach to extract multi-lingual information for crime analysis
International crime and terrorism have drawn increasing attention in recent years. Retrieving relevant information from criminal records and suspect communications is important in...
Christopher C. Yang, Kar Wing Li
EAAI
2007
87views more  EAAI 2007»
13 years 7 months ago
Experience-based service provider selection in agent-mediated E-Commerce
For a given service demand, it is necessary to select a suitable service provider among many possibilities. An accurate selection is difficult when consumers do not have a signi...
Murat Sensoy, F. Canan Pembe, Hande Zirtiloglu, Pi...
« Prev « First page 2479 / 2492 Last » Next »