Sciweavers

5615 search results - page 1003 / 1123
» Active Learner Modelling
Sort
View
139
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
138
Voted
HPDC
2010
IEEE
15 years 3 months ago
A perspective on scientific cloud computing
Cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges that must be met. We review these challenges and how they relate to sc...
Craig A. Lee
140
Voted
FGR
2008
IEEE
165views Biometrics» more  FGR 2008»
15 years 3 months ago
The significance of facial features for automatic sign language recognition
Although facial features are considered to be essential for humans to understand sign language, no prior research work has yet examined their significance for automatic sign langu...
Ulrich von Agris, Moritz Knorr, Karl-Friedrich Kra...
ANOR
2010
135views more  ANOR 2010»
15 years 3 months ago
A framework of irregularity enlightenment for data pre-processing in data mining
Abstract Irregularities are widespread in large databases and often lead to erroneous conclusions with respect to data mining and statistical analysis. For example, considerable bi...
Siu-Tong Au, Rong Duan, Siamak G. Hesar, Wei Jiang
137
Voted
ANOR
2007
180views more  ANOR 2007»
15 years 3 months ago
Ethics in OR/MS: past, present and future
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Jean-Pierre Brans, Giorgio Gallo
« Prev « First page 1003 / 1123 Last » Next »