Sciweavers

3864 search results - page 747 / 773
» time 2005
Sort
View
ISI
2005
Springer
14 years 1 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
ISI
2005
Springer
14 years 1 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen
ISRR
2005
Springer
140views Robotics» more  ISRR 2005»
14 years 1 months ago
Tradeoffs Between Directed and Autonomous Driving on the Mars Exploration Rovers
NASA’s Mars Exploration Rovers (MER) have collected a great diversity of geological science results, thanks in large part to their surface mobility capabilities. The six wheel r...
Jeffrey J. Biesiadecki, Chris Leger, Mark W. Maimo...
IWANN
2005
Springer
14 years 1 months ago
Block LDA for Face Recognition
Linear Discriminant Analysis (LDA) technique is an important and well-developed area of image recognition and to date many linear discrimination methods have been put forward. Desp...
Vo Dinh Minh Nhat, Sungyoung Lee
IWQOS
2005
Springer
14 years 1 months ago
Processor Sharing Flows in the Internet
Most congestion control algorithms try to emulate processor sharing (PS) by giving each competing flow an equal share of a bottleneck link. This approach leads to fairness, and pr...
Nandita Dukkipati, Masayoshi Kobayashi, Rui Zhang-...