Sciweavers

953 search results - page 94 / 191
» INEX 2007 Evaluation Measures
Sort
View
APVIS
2009
15 years 2 months ago
Point-based tree representation: A new approach for large hierarchies
Space-filling layout techniques for tree representations are frequently used when the available screen space is small or the data set is large. In this paper, we propose a new app...
Hans-Jörg Schulz, Steffen Hadlak, Heidrun Sch...
CORIA
2009
15 years 2 months ago
Clustering en recherche d'information : concentration vs distribution de l'information pertinente
Relying on the Cluster Hypothesis, which states that relevant documents tend to be more similar one to each other than to non-relevant ones, most of information retrieval systems p...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
IJRFITA
2007
205views more  IJRFITA 2007»
15 years 1 months ago
2D localisation using SAW-based RFID systems: a single antenna approach
: This paper presents a novel Real-Time Localisation System (RTLS) based upon 2.45 GHz Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) systems. The system utilise...
Darmindra D. Arumugam, Vijayakrishnan Ambravaneswa...
BC
2002
91views more  BC 2002»
15 years 1 months ago
Linear combinations of nonlinear models for predicting human-machine interface forces
ACT This study presents a computational framework that capitalizes on known human neuromechanical characteristics during limb movements in order to predict man-machine interactions...
James L. Patton, Ferdinando A. Mussa-Ivaldi
CN
2007
80views more  CN 2007»
15 years 1 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang