Sciweavers

1010 search results - page 58 / 202
» Designing Then and Now
Sort
View
83
Voted
CSE
2009
IEEE
15 years 5 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
ICASSP
2009
IEEE
15 years 5 months ago
A multiplicative weight perturbation scheme for distributed beamforming in wireless relay networks with 1-bit feedback
This paper focuses on perturbation-based distributed beamforming with 1-bit feedback for wireless amplify-and-forward relay networks. We propose to use multiplicative perturbation...
Peter Fertl, Ari Hottinen, Gerald Matz
ECMDAFA
2009
Springer
138views Hardware» more  ECMDAFA 2009»
15 years 5 months ago
A Pattern Mining Approach Using QVT
Model Driven Software Development (MDSD) has matured over the last few years and is now becoming an established technology. Models are used in various contexts, where the possibili...
Jens Kübler, Thomas Goldschmidt
62
Voted
ERCIMDL
2009
Springer
117views Education» more  ERCIMDL 2009»
15 years 5 months ago
Improving OCR Accuracy for Classical Critical Editions
This paper describes a work-flow designed to populate a digital library of ancient Greek critical editions with highly accurate OCR scanned text. While the most recently available...
Federico Boschetti, Matteo Romanello, Alison Babeu...
MHCI
2009
Springer
15 years 5 months ago
Kartta: extracting landmarks near personalized points-of-interest from user generated content
Most mobile navigation systems focus on answering the question, “I know where I want to go, now can you show me exactly how to get there?” While this approach works well for m...
Arttu Perttula, Scott Carter, Laurent Denoue