Sciweavers

184 search results - page 31 / 37
» An Information Architecture for Validating Courseware
Sort
View
DAC
2005
ACM
15 years 10 months ago
Hardware speech recognition for user interfaces in low cost, low power devices
We propose a system architecture for real-time hardware speech recognition on low-cost, power-constrained devices. The system is intended to support real-time speech-based user in...
Sergiu Nedevschi, Rabin K. Patra, Eric A. Brewer
79
Voted
IJIS
2002
112views more  IJIS 2002»
14 years 9 months ago
Integrating fuzzy topological maps and fuzzy geometric maps for behavior-based robots
ior-based robots, planning is necessary to elaborate abstract plans that resolve complex navigational tasks. Usually maps of the environment are used to plan the robot motion and t...
Eugenio Aguirre, Antonio González
73
Voted
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
15 years 10 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
177
Voted
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
15 years 9 months ago
DiMaC: a system for cleaning disguised missing data
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
91
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan