Sciweavers

8881 search results - page 1768 / 1777
» Active Data Clustering
Sort
View
CIKM
2010
Springer
14 years 8 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
CORR
2008
Springer
161views Education» more  CORR 2008»
14 years 8 months ago
Compressed Sensing of Analog Signals
Abstract--A traditional assumption underlying most data converters is that the signal should be sampled at a rate exceeding twice the highest frequency. This statement is based on ...
Yonina C. Eldar
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ISF
2010
109views more  ISF 2010»
14 years 8 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
JOCN
2010
86views more  JOCN 2010»
14 years 8 months ago
Neural Basis of Repetition Priming during Mathematical Cognition: Repetition Suppression or Repetition Enhancement?
■ We investigated the neural basis of repetition priming (RP) during mathematical cognition. Previous studies of RP have focused on repetition suppression as the basis of behavi...
Valorie N. Salimpoor, Catie Chang, Vinod Menon
« Prev « First page 1768 / 1777 Last » Next »