Sciweavers

17450 search results - page 3477 / 3490
» Numerical Methods with Applications
Sort
View
WWW
2011
ACM
14 years 6 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
TSP
2011
152views more  TSP 2011»
14 years 6 months ago
Blind Adaptive Constrained Constant-Modulus Reduced-Rank Interference Suppression Algorithms Based on Interpolation and Switched
—This work proposes a blind adaptive reduced-rank scheme and constrained constant-modulus (CCM) adaptive algorithms for interference suppression in wireless communications system...
Rodrigo C. de Lamare, Raimundo Sampaio Neto, Marti...
ISEMANTICS
2010
14 years 6 months ago
Towards the formalization of interaction semantics
With the advent of Web 2.0 and the emergence of improved technologies to enhance UI, the importance of user experience and intuitiveness of Web interfaces led to the growth and su...
Irene Celino, Francesco Corcoglioniti
JCIT
2010
127views more  JCIT 2010»
14 years 6 months ago
Review of PSE (Problem Solving Environment) Study
This review paper presents an overview of the current state of the art in Problem Solving Environments (PSE). PSE provides integrated human-friendly innovative computational servi...
Shigeo Kawata
JIPS
2010
195views more  JIPS 2010»
14 years 6 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
« Prev « First page 3477 / 3490 Last » Next »