Sciweavers

6530 search results - page 1285 / 1306
» Application Integration
Sort
View
IJMMS
2007
173views more  IJMMS 2007»
15 years 1 months ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
SMA
2008
ACM
150views Solid Modeling» more  SMA 2008»
15 years 1 months ago
Surface matching using consistent pants decomposition
Surface matching is fundamental to shape computing and various downstream applications. This paper develops a powerful pants decomposition framework for computing maps between sur...
Xin Li, Xianfeng Gu, Hong Qin
125
Voted
AIEDU
2005
185views more  AIEDU 2005»
15 years 1 months ago
A Bayesian Student Model without Hidden Nodes and its Comparison with Item Response Theory
The Bayesian framework offers a number of techniques for inferring an individual's knowledge state from evidence of mastery of concepts or skills. A typical application where ...
Michel C. Desmarais, Xiaoming Pu
142
Voted
TCAD
2008
195views more  TCAD 2008»
15 years 1 months ago
Multilayer Obstacle-Avoiding Rectilinear Steiner Tree Construction Based on Spanning Graphs
Given a set of pins and a set of obstacles on routing layers, a multilayer obstacle-avoiding rectilinear Steiner minimal tree (ML-OARSMT) connects these pins by rectilinear edges w...
Chung-Wei Lin, Shih-Lun Huang, Kai-Chi Hsu, Meng-X...
135
Voted
ASE
2005
124views more  ASE 2005»
15 years 1 months ago
Reuse-Conducive Development Environments
Despite its well-recognized benefits, software reuse has not met its expected success due to technical, cognitive, and social difficulties. We have systematically analyzed the reu...
Yunwen Ye, Gerhard Fischer
« Prev « First page 1285 / 1306 Last » Next »