Sciweavers

1489 search results - page 200 / 298
» The First Bug Report
Sort
View
ALENEX
2003
137views Algorithms» more  ALENEX 2003»
15 years 6 months ago
The Markov Chain Simulation Method for Generating Connected Power Law Random Graphs
Graph models for real-world complex networks such as the Internet, the WWW and biological networks are necessary for analytic and simulation-based studies of network protocols, al...
Christos Gkantsidis, Milena Mihail, Ellen W. Zegur...
133
Voted
ECIS
2003
15 years 6 months ago
E-learning and SMEs: do demand and supply speak the same language?
This paper reports on research-in-progress designed to understand adoption and diffusion of e-learning (EL) among small and medium-sized enterprises (SMEs) in northern Italy. The ...
Paola Bielli, Jane E. Klobas
NIPS
2004
15 years 6 months ago
Instance-Based Relevance Feedback for Image Retrieval
High retrieval precision in content-based image retrieval can be attained by adopting relevance feedback mechanisms. These mechanisms require that the user judges the quality of t...
Giorgio Giacinto, Fabio Roli
136
Voted
NLUCS
2004
15 years 6 months ago
Making Cognitive Summarization Agents Work In A Real-World Domain
The advantage of cognitively motivated automatic summarizing is that human users can better understand what happens. This improves acceptability. The basic empirical finding in hum...
Brigitte Endres-Niggemeyer, Elisabeth Wansorra
IAAI
2003
15 years 6 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...