Sciweavers

539 search results - page 100 / 108
» Finding Groups in Data: Cluster Analysis with Ants
Sort
View
86
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 11 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
15 years 6 months ago
Showing Users the Way: Signs in Virtual Worlds
In this paper, we report the results of a pilot study designed to evaluate the impact of signs as navigation aids in virtual worlds. Test subjects were divided into three groups (...
Daniel C. Cliburn, Stacy Rilea
CSCW
2008
ACM
15 years 1 months ago
"Are you watching this film or what?": interruption and the juggling of cohorts
A proliferation of mobile devices in everyday life has increased the likelihood of technologically mediated interruptions. We examine ethnographic data from an SMSbased pervasive ...
Peter Tolmie, Andy Crabtree, Tom Rodden, Steve Ben...
DGO
2008
113views Education» more  DGO 2008»
15 years 1 months ago
A study in rule-specific issue categorization for e-rulemaking
We address the e-rulemaking problem of categorizing public comments according to the issues that they address. In contrast to previous text categorization research in e-rulemaking...
Claire Cardie, Cynthia Farina, Adil Aijaz, Matt Ra...
ISI
2006
Springer
14 years 11 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen