Sciweavers

1287 search results - page 109 / 258
» Effective Performance Measurement at Petascale Using IPM
Sort
View
74
Voted
AAAI
2004
15 years 3 months ago
Evaluating Ontology Cleaning
Ontology as a discipline of Computer Science has made many claims about its usefulness, however to date there has been very little evaluation of those claims. We present the resul...
Christopher A. Welty, Ruchi Mahindru, Jennifer Chu...
CGF
2008
79views more  CGF 2008»
15 years 1 months ago
Evaluation of illustration-inspired techniques for time-varying data visualization
Illustration-inspired techniques have provided alternative ways to visualize time-varying data. Techniques such as speedlines, flow ribbons, strobe silhouettes and opacity-based t...
Alark Joshi, Penny Rheingans
IJCAI
2007
15 years 3 months ago
Logistic Regression Models for a Fast CBIR Method Based on Feature Selection
Distance measures like the Euclidean distance have been the most widely used to measure similarities between feature vectors in the content-based image retrieval (CBIR) systems. H...
Riadh Ksantini, Djemel Ziou, Bernard Colin, Fran&c...
JOCN
2010
60views more  JOCN 2010»
15 years 8 days ago
Responding with Restraint: What Are the Neurocognitive Mechanisms?
■ An important aspect of cognitive control is the ability to respond with restraint. Here, we modeled this experimentally by measuring the degree of response slowing that occurs...
Sara Jahfari, Cathy M. Stinear, Mike Claffey, Fred...
MOBIHOC
2005
ACM
16 years 1 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...