Sciweavers

1575 search results - page 191 / 315
» The provenance of electronic data
Sort
View
MOBISYS
2007
ACM
15 years 11 months ago
Participatory user centered design techniques for a large scale ad-hoc health information system
During mass casualty incidents, an enormous amount of data, including the vital signs of the patients, the location of the patients, and the location of the first responders must ...
Tia Gao, Tammara Massey, Majid Sarrafzadeh, Leo Se...
FSKD
2009
Springer
138views Fuzzy Logic» more  FSKD 2009»
15 years 6 months ago
Censoring Biological Echoes in Weather Radar Images
Weather radar data is susceptible to several artifacts due to anamalous propagation, ground clutter, electronic interference, sun angle, second-trip echoes and biological contamin...
Valliappa Lakshmanan, Jian Zhang
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
15 years 5 months ago
Panel Session
 The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...
SAC
2005
ACM
15 years 5 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar users...
Huseyin Polat, Wenliang Du
ISWC
2003
IEEE
15 years 5 months ago
SenSay: A Context-Aware Mobile Phone
SenSay is a context-aware mobile phone that adapts to dynamically changing environmental and physiological states. In addition to manipulating ringer volume, vibration, and phone ...
Daniel P. Siewiorek, Asim Smailagic, Junichi Furuk...