Sciweavers

1242 search results - page 227 / 249
» Digital Objects as Passwords
Sort
View
WS
2005
ACM
15 years 3 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
CIKM
2005
Springer
15 years 3 months ago
Focused crawling for both topical relevance and quality of medical information
Subject-specific search facilities on health sites are usually built using manual inclusion and exclusion rules. These can be expensive to maintain and often provide incomplete c...
Thanh Tin Tang, David Hawking, Nick Craswell, Kath...
HPCC
2005
Springer
15 years 3 months ago
Correction of Building Height Effect Using LIDAR and GPS
Abstract. Correction of building height effects is a critical step in image interpretation from aerial imagery in urban area. In this paper, an efficient scheme to correct building...
Hong-Gyoo Sohn, Kong-Hyun Yun, Gi-Hong Kim, Hyo Su...
ICMI
2005
Springer
140views Biometrics» more  ICMI 2005»
15 years 3 months ago
An initial usability assessment for symbolic haptic rendering of music parameters
Current methods of playlist creation and maintenance do not support user needs, especially in a mobile context. Furthermore, they do not scale: studies show that users with large ...
Meghan Allen, Jennifer Gluck, Karon E. MacLean, Er...
83
Voted
KDD
2005
ACM
106views Data Mining» more  KDD 2005»
15 years 3 months ago
Enhancing the lift under budget constraints: an application in the mutual fund industry
A lift curve, with the true positive rate on the y-axis and the customer pull (or contact) rate on the x-axis, is often used to depict the model performance in many data mining ap...
Lian Yan, Michael Fassino, Patrick Baldasare