Sciweavers

2111 search results - page 154 / 423
» Understanding the Yarowsky Algorithm
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
14 years 6 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
APWEB
2011
Springer
14 years 5 months ago
Assisting the Design of XML Schema: Diagnosing Nondeterministic Content Models
One difficulty in the design of XML Schema is the restriction that the content models should be deterministic, i. e., the Unique Particle Attribution (UPA) constraint, which means ...
Haiming Chen, Ping Lu
JAIS
2010
105views Algorithms» more  JAIS 2010»
14 years 4 months ago
Effects of Interactivity on Website Involvement and Purchase Intention
This study aims to understand how website interactivity (active control and reciprocal communication) can impact purchase intention through website involvement and how the impacts...
Zhenhui Jiang, Jason Chan, Bernard C. Y. Tan, Wei ...
VLUDS
2010
125views Visualization» more  VLUDS 2010»
14 years 4 months ago
A Survey of Interface Tracking Methods in Multi-phase Fluid Visualization
A central feature that scientists are interested in is the dynamics of fluid interfaces or the so called material boundaries in multi-fluid simulation . Visualization techniques f...
Fang Chen, Hans Hagen
CISS
2010
IEEE
14 years 1 months ago
Using laser scanners for modeling and analysis in architecture, engineering, and construction
— Laser scanners are rapidly gaining acceptance as a tool for three dimensional (3D) modeling and analysis in the architecture, engineering, and construction (AEC) domain. Since ...
Daniel Huber, Burcu Akinci, Pingbo Tang, Antonio A...