Sciweavers

1400 search results - page 274 / 280
» Post-Analysis of Learned Rules
Sort
View
102
Voted
CIKM
2005
Springer
15 years 5 months ago
Focused crawling for both topical relevance and quality of medical information
Subject-specific search facilities on health sites are usually built using manual inclusion and exclusion rules. These can be expensive to maintain and often provide incomplete c...
Thanh Tin Tang, David Hawking, Nick Craswell, Kath...
92
Voted
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 5 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
IWANN
2005
Springer
15 years 5 months ago
Characterizing Self-developing Biological Neural Networks: A First Step Towards Their Application to Computing Systems
Carbon nanotubes are often seen as the only alternative technology to silicon transistors. While they are the most likely short-term alternative, other longer-term alternatives sho...
Hugues Berry, Olivier Temam
104
Voted
UIST
2004
ACM
15 years 5 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
ACRI
2004
Springer
15 years 5 months ago
Optimizing the Behavior of a Moving Creature in Software and in Hardware
We have investigated a problem where the goal is to find automatically the best rule for a cell in the cellular automata model. The cells are either of type OBSTACLE, EMPTY or CRE...
Mathias Halbach, Wolfgang Heenes, Rolf Hoffmann, J...