Sciweavers

11211 search results - page 2079 / 2243
» Rank-Sensitive Data Structures
Sort
View
CE
2007
101views more  CE 2007»
15 years 1 months ago
Empirical examination of the adoption of WebCT using TAM
Web Course Tools (WebCT) have enhanced the ability and motivation of institutes of higher education to support e-learning. In this study, we extended the Technology Acceptance Mod...
E. W. T. Ngai, J. K. L. Poon, Y. H. C. Chan
GRID
2006
Springer
15 years 1 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
IJON
2008
101views more  IJON 2008»
15 years 1 months ago
Learning dynamics and robustness of vector quantization and neural gas
Various alternatives have been developed to improve the Winner-Takes-All (WTA) mechanism in vector quantization, including the Neural Gas (NG). However, the behavior of these algo...
Aree Witoelar, Michael Biehl, Anarta Ghosh, Barbar...
CG
2007
Springer
15 years 1 months ago
Storylines: Visual exploration and analysis in latent semantic spaces
Tasks in visual analytics differ from typical information retrieval tasks in fundamental ways. A critical part of a visual analytics is to ask the right questions when dealing wit...
Weizhong Zhu, Chaomei Chen
IJRR
2008
107views more  IJRR 2008»
15 years 1 months ago
Caging Polygons with Two and Three Fingers
: We present algorithms for computing all placements of two and three fingers that cage a given polygonal object with n edges in the plane. A polygon is caged when it is impossible...
Mostafa Vahedi, A. Frank van der Stappen
« Prev « First page 2079 / 2243 Last » Next »