Sciweavers

897 search results - page 164 / 180
» Identity: How to name it, How to find it
Sort
View
JPDC
2011
155views more  JPDC 2011»
14 years 2 months ago
A cellular learning automata-based deployment strategy for mobile wireless sensor networks
: One important problem which may arise in designing a deployment strategy for a wireless sensor network is how to deploy a specific number of sensor nodes throughout an unknown ne...
Mehdi Esnaashari, Mohammad Reza Meybodi
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 5 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
GI
2010
Springer
14 years 10 months ago
Is it Possible to Interact with a Handheld Device While Holding it in Both Hands?
Abstract: Intuitiveness, attractiveness and efficiency are in general important characteristics of high quality User Interfaces (UI). In the case of a Mass Casualty Incident (MCI)...
Tayfur Coskun, Eva Artinger, Simon Nestler, Amal B...
ECCV
2008
Springer
16 years 1 months ago
A Perceptual Comparison of Distance Measures for Color Constancy Algorithms
Abstract. Color constancy is the ability to measure image features independent of the color of the scene illuminant and is an important topic in color and computer vision. As many ...
Arjan Gijsenij, Theo Gevers, Marcel P. Lucassen
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 7 days ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester