Sciweavers

5577 search results - page 196 / 1116
» E2K Technology and Implementation
Sort
View
SERP
2004
15 years 6 months ago
The Architectural Design of FRUIT: A Family of Retargetable User Interface Tools
Forms-based user interfaces are widely used means for human-computer interaction. However, it is difficult to exploit software reuse in forms-based systems because the systems ten...
Yi Liu, H. Conrad Cunningham, Hui Xiong
CLEF
2010
Springer
15 years 6 months ago
Question Answering System: Retrieving Relevant Passages
This paper discusses the QA system submitted by Dhirubhai Ambani Institute of Information and Communication Technology, India in the ResPubliQA 2010. We have participated in the mo...
Hitesh Sabnani, Prasenjit Majumder
ICMCS
2010
IEEE
181views Multimedia» more  ICMCS 2010»
15 years 3 months ago
LDPC FEC code extension for unequal error protection in 2nd generation DVB systems
One of the envisioned advantages of scalable video coding is its inherent suitability for achieving unequal error protection (UEP). UEP can be effectively used for graceful qualit...
Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj
IEEECIT
2010
IEEE
15 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ISF
2010
109views more  ISF 2010»
15 years 3 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...