Sciweavers

6618 search results - page 1305 / 1324
» Information and Communication Technologies for Development
Sort
View
EICS
2009
ACM
15 years 4 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often deļ...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
ICCV
2007
IEEE
15 years 4 months ago
Drowsy Driver Detection Through Facial Movement Analysis
The advance of computing technology has provided the means for building intelligent vehicle systems. Drowsy driver detection system is one of the potential applications of intellig...
Esra Vural, Müjdat Çetin, Aytül E...
CIKM
2007
Springer
15 years 3 months ago
Evaluation of partial path queries on xml data
XML query languages typically allow the specification of structural patterns of elements. Finding the occurrences of such patterns in an XML tree is the key operation in XML quer...
Stefanos Souldatos, Xiaoying Wu, Dimitri Theodorat...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 3 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
« Prev « First page 1305 / 1324 Last » Next »