Sciweavers

24529 search results - page 4566 / 4906
» Computing on Authenticated Data
Sort
View
CSCW
2011
ACM
14 years 11 months ago
Peer interaction effectively, yet infrequently, enables programmers to discover new tools
Computer users rely on software tools to work effectively and efficiently, but it is difficult for users to be aware of all the tools that might be useful to them. While there a...
Emerson R. Murphy-Hill, Gail C. Murphy
CSDA
2011
14 years 11 months ago
Approximate forward-backward algorithm for a switching linear Gaussian model
Motivated by the application of seismic inversion in the petroleum industry we consider a hidden Markov model with two hidden layers. The bottom layer is a Markov chain and given ...
Hugo Hammer, Håkon Tjelmeland
EWC
2011
98views more  EWC 2011»
14 years 11 months ago
Real-time triangulation of point streams
Hand-held laser scanners are commonly used in industry for reverse engineering and quality measurements. In this process, it is difficult for the human operator to scan the target...
Klaus Denker, Burkhard Lehner, Georg Umlauf
INFORMATICALT
2011
170views more  INFORMATICALT 2011»
14 years 11 months ago
Community Detection Through Optimal Density Contrast of Adjacency Matrix
Detecting communities in real world networks is an important problem for data analysis in science and engineering. By clustering nodes intelligently, a recursive algorithm is desig...
Tianzhu Liang, Kwok Yip Szeto
JASIS
2011
98views more  JASIS 2011»
14 years 11 months ago
Hip and trendy: Characterizing emerging trends on Twitter
Twitter, Facebook, and other related systems that we call social awareness streams are rapidly changing the information and communication dynamics of our society. These systems, w...
Mor Naaman, Hila Becker, Luis Gravano
« Prev « First page 4566 / 4906 Last » Next »