Sciweavers

16513 search results - page 2980 / 3303
» Numerical Analysis Methods
Sort
View
ECIS
2001
15 years 6 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath
IJIT
2004
15 years 6 months ago
On the Noise Distance in Robust Fuzzy C-Means
In the last decades, a number of robust fuzzy clustering algorithms have been proposed to partition data sets affected by noise and outliers. Robust fuzzy C-means (robust-FCM) is c...
Mario G. C. A. Cimino, Graziano Frosini, Beatrice ...
138
Voted
ISCAPDCS
2004
15 years 6 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ECIS
2003
15 years 6 months ago
Actor network theory and after: what's new for IS research?
The basic argument presented in the paper is that actor network theory has often been forced to adopt the ontology of interpretivism and thus suppress its own ontology. Interpreti...
Antonio Cordella, Maha Shaikh
NIPS
2004
15 years 6 months ago
Assignment of Multiplicative Mixtures in Natural Images
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...
« Prev « First page 2980 / 3303 Last » Next »