Sciweavers

84 search results - page 16 / 17
» Evaluation of Offset Assignment Heuristics
Sort
View
SIGIR
2004
ACM
13 years 11 months ago
Web-a-where: geotagging web content
We describe Web-a-Where, a system for associating geography with Web pages. Web-a-Where locates mentions of places and determines the place each name refers to. In addition, it as...
Einat Amitay, Nadav Har'El, Ron Sivan, Aya Soffer
ICDCS
2010
IEEE
13 years 6 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
SIGSOFT
2008
ACM
14 years 6 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
IWCMC
2010
ACM
13 years 11 months ago
Energy-aware online routing with QoS constraints in multi-rate wireless ad hoc networks
Wireless ad hoc networks consist of hundreds to thousands of mobile nodes that are powered by batteries. To prolong the network operational time, energy conservation in such netwo...
Wei Yang, Weifa Liang, Jun Luo, Wenhua Dou
CSREASAM
2006
13 years 7 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin