Sciweavers

5829 search results - page 1156 / 1166
» The Practice of Cluster Analysis
Sort
View
PUC
2007
90views more  PUC 2007»
14 years 11 months ago
Digital homes on wheels: designing for the unimagined home
Design for the digital home is often predicated on an ideal, imagined domestic space that is expansive, stable, occupied by a ‘‘busy’’ nuclear family, and does not always m...
Alexandra Zafiroglu, Michele Chang
ESWA
2010
154views more  ESWA 2010»
14 years 10 months ago
Robust speech interaction in motorcycle environment
Aiming at robust spoken dialogue interaction in motorcycle environment, we investigate various configurations for a speech front-end, which consists of speech pre-processing, spee...
Iosif Mporas, Otilia Kocsis, Todor Ganchev, Nikos ...
GIS
2010
ACM
14 years 10 months ago
Decentralized querying of topological relations between regions without using localization
This paper proposes an efficient, decentralized algorithm for determining the topological relationship between two regions monitored by a geosensor network. Many centralized algo...
Matt Duckham, Myeong Hun Jeong, Sanjiang Li, Joche...
IS
2010
14 years 10 months ago
Extracting a largest redundancy-free XML storage structure from an acyclic hypergraph in polynomial time
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free ...
Wai Yin Mok, Joseph Fong, David W. Embley
JCS
2010
135views more  JCS 2010»
14 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
« Prev « First page 1156 / 1166 Last » Next »