Sciweavers

8468 search results - page 1589 / 1694
» The Technology of Data Stashing
Sort
View
IJHCI
2007
145views more  IJHCI 2007»
14 years 9 months ago
20 Years of Four HCI Conferences: A Visual Exploration
We present a visual exploration of the field of human-computer interaction through the author and article metadata of four of its major conferences: the ACM conferences on Comput...
Nathalie Henry, Howard Goodell, Niklas Elmqvist, J...
INTERNET
2007
113views more  INTERNET 2007»
14 years 9 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
TIFS
2008
129views more  TIFS 2008»
14 years 9 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
JCST
2007
151views more  JCST 2007»
14 years 9 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng
CCE
2005
14 years 9 months ago
CFD analyses of complex flows
Computational fluid dynamics (CFD) of complex processes and complicated geometries embraces the transport of momentum, heat, and mass including the description of reaction kinetic...
Richard Farmer, Ralph Pike, Gary Cheng
« Prev « First page 1589 / 1694 Last » Next »