Sciweavers

2826 search results - page 387 / 566
» A resource-based analysis of IT sourcing
Sort
View
BWCCA
2010
14 years 8 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
132
Voted
JSAC
2011
127views more  JSAC 2011»
14 years 8 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
FGR
2011
IEEE
247views Biometrics» more  FGR 2011»
14 years 5 months ago
Segment and recognize expression phase by fusion of motion area and neutral divergence features
—An expression can be approximated by a sequence of temporal segments called neutral, onset, offset and apex. However, it is not easy to accurately detect such temporal segments ...
Shizhi Chen, YingLi Tian, Qingshan Liu, Dimitris N...
111
Voted
HCI
2011
14 years 5 months ago
Display Requirements for an Interactive Rail Scheduling Display
: This work, a collaboration between Alstom Transport and the MIT Humans and Automation Laboratory (HAL), is focused on the development of an interactive in-cab scheduling interfac...
Jacqueline M. Tappan, David J. Pitman, Mary L. Cum...
198
Voted
ECSCW
2011
14 years 1 months ago
Digital Traces of Interest: Deriving Interest Relationships from Social Media Interactions
Facebook and Twitter have changed the way we consume information, allowing the people we follow to become our “social filters” and determine the content of our information stre...
Michal Jacovi, Ido Guy, Inbal Ronen, Adam Perer, E...