Sciweavers

1416 search results - page 153 / 284
» cost 2009
Sort
View
ASIAMS
2009
IEEE
14 years 5 months ago
A Case Study of Networks Simulation Tools for Wireless Networks
Networking community is largely depend on simulation to evaluate the behavior and performance of protocols for wireless networks, simulations are a good compromise between cost an...
Saurabh Mehta, Niamat Ullah, Humaun Kabir, Mst. Na...
BIBE
2009
IEEE
161views Bioinformatics» more  BIBE 2009»
14 years 5 months ago
Soft Tissue Deformation and Optimized Data Structures for Mass Spring Methods
One of the essential components of a virtual reality surgical simulation is deformation. Deformations in computer graphics and surgical simulations are commonly modeled with three...
Tansel Halic, Sinan Kockara, Coskun Bayrak, Richar...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
14 years 5 months ago
Digital Pen: Four Rounds of Ethnographic and Field Research
We report on a year-long qualitative and ethnographic project to examine the value of digital pen technology for note taking. A digital pen captures a facsimile of information wri...
Christopher N. Chapman, Michal Lahav, Susan Burges...
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 5 months ago
Approximate Dynamic Programming in Knowledge Discovery for Rapid Response
One knowledge discovery problem in the rapid response setting is the cost of learning which patterns are indicative of a threat. This typically involves a detailed follow-through,...
Peter Frazier, Warren B. Powell, Savas Dayanik, Pa...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 5 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...