Sciweavers

8135 search results - page 1539 / 1627
» network 2008
Sort
View
CORR
2008
Springer
188views Education» more  CORR 2008»
15 years 2 months ago
Citation Counting, Citation Ranking, and h-Index of Human-Computer Interaction Researchers: A Comparison between Scopus and Web
: This study examines the differences between Scopus and Web of Science in the citation counting, citation ranking, and h-index of 22 top human-computer interaction (HCI) researche...
Lokman I. Meho, Yvonne Rogers
159
Voted
SOCO
2008
Springer
15 years 1 months ago
Context-aware, self-scaling Fuzzy ArtMap for received signal strength based location systems
Location awareness is the key capability of mobilecomputingapplications. Despitehighdemand, indoor location technologies have not become truly ubiquitous mainly due to their requir...
Uzair Ahmad, Andrey Gavrilov, Young-Koo Lee, Sungy...
122
Voted
P2P
2010
IEEE
150views Communications» more  P2P 2010»
15 years 1 months ago
Spotify -- Large Scale, Low Latency, P2P Music-on-Demand Streaming
Abstract—Spotify is a music streaming service offering lowlatency access to a library of over 8 million music tracks. Streaming is performed by a combination of client-server acc...
Gunnar Kreitz, Fredrik Niemelä
120
Voted
ACL
2009
15 years 1 months ago
Incremental HMM Alignment for MT System Combination
Inspired by the incremental TER alignment, we re-designed the Indirect HMM (IHMM) alignment, which is one of the best hypothesis alignment methods for conventional MT system combi...
Chi-Ho Li, Xiaodong He, Yupeng Liu, Ning Xi
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
« Prev « First page 1539 / 1627 Last » Next »