Sciweavers

7253 search results - page 1140 / 1451
» Agile Performance Testing
Sort
View
114
Voted
ICAD
2004
15 years 5 months ago
Data Set Selection for a Constrained Simple Sonification
Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Shawn C. Garner
ICAD
2004
15 years 5 months ago
Perception of Unattended Speech
This study addresses the question of speech processing under unattended conditions. Dupoux et al. (2003) have recently claimed that unattended words are not lexically processed. W...
Marie Rivenez, Chris Darwin, Anne Guillaume
138
Voted
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 5 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
CAINE
2003
15 years 5 months ago
A Genetic Algorithm for Clustering on Very Large Data Sets
Clustering is the process of subdividing an input data set into a desired number of subgroups so that members of the same subgroup are similar and members of different subgroups h...
Jim Gasvoda, Qin Ding
124
Voted
ECSCW
2001
15 years 5 months ago
Reducing interference in single display groupware through transparency
Single Display Groupware (SDG) supports face-to-face collaborators working over a single shared display, where all people have their own input device Although SDG is simple in conc...
Ana Zanella, Saul Greenberg
« Prev « First page 1140 / 1451 Last » Next »