Sciweavers

1298 search results - page 195 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
119
Voted
CSUR
2000
101views more  CSUR 2000»
15 years 3 months ago
Extracting usability information from user interface events
to extract information at a level of abstraction that is useful to investigators interested in analyzing application usage or evaluating usability. This survey examines computer-ai...
David M. Hilbert, David F. Redmiles
164
Voted
JFR
2008
103views more  JFR 2008»
15 years 3 months ago
Monte Carlo localization in outdoor terrains using multilevel surface maps
We propose a novel combination of techniques for robustly estimating the position of a mobile robot in outdoor environments using range data. Our approach applies a particle filte...
Rainer Kümmerle, Rudolph Triebel, Patrick Pfa...
137
Voted
UM
2010
Springer
15 years 1 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...
114
Voted
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
15 years 9 months ago
Exploring the Clinical Notes of Pathology Ordering by Australian General Practitioners: a text mining perspective
A massive rise in the number and expenditure of pathology ordering by general practitioners (GPs) concerns the government and attracts various studies with the aim to understand a...
Zoe Yan Zhuang, Rasika Amarasiri, Leonid Churilov,...
CCGRID
2007
IEEE
15 years 9 months ago
Redundancy Management for P2P Storage
P2P storage systems must protect data against temporary unavailability and the effects of churn in order to become platforms for safe storage. This paper evaluates and compares re...
Chris Williams, Philippe Huibonhoa, JoAnne Hollida...