Sciweavers

1750 search results - page 158 / 350
» E-Commerce Development Procedure
Sort
View
86
Voted
ICHIM
2001
65views more  ICHIM 2001»
15 years 6 months ago
Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence
In this paper it is studied how the analysis of the structure of the paper of Rembrandt's etchings can help determining the authenticity of the etchings and the dates of the ...
Jan C. A. van der Lubbe, Eugene P. van Someren, Ma...
SODA
2004
ACM
98views Algorithms» more  SODA 2004»
15 years 6 months ago
End-to-end packet-scheduling in wireless ad-hoc networks
Abstract Packet-scheduling is a particular challenge in wireless networks due to interference from nearby transmissions. A distance-2 interference model serves as a useful abstract...
V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Pa...
126
Voted
INTERACT
2003
15 years 6 months ago
How Blind Users' Mental Models Affect Their Perceived Usability of an Unfamiliar Screen Reader
: This study investigates blind users’ mental models of Windows environment and their strategies in coping with new desktops and applications. The relationship between users’ m...
Sri Hastuti Kurniawan, Alistair G. Sutcliffe, Paul...
WSC
2004
15 years 6 months ago
New Event-driven Sampling Techniques for Network Reliability Estimation
Exactly computing network reliability measures is an NPhard problem. Therefore, Monte Carlo simulation has been frequently used by network designers to obtain accurate estimates. ...
Abdullah Konak, Alice E. Smith, Sadan Kulturel-Kon...
WSC
2004
15 years 6 months ago
Airport Terminal-Approach Safety and Capacity Analysis Using an Agent-Based Model
The consistent growth of air traffic demand is causing the operational volumes at hub airports to approach their maximum capacities. With this growth, delays are increasing, and s...
Yue Xie, John Shortle, George Donohue