Sciweavers

384 search results - page 60 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
16 years 4 days ago
Query chains: learning to rank from implicit feedback
This paper presents a novel approach for using clickthrough data to learn ranked retrieval functions for web search results. We observe that users searching the web often perform ...
Filip Radlinski, Thorsten Joachims
ADHOCNOW
2006
Springer
15 years 5 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
EURONGI
2004
Springer
15 years 3 months ago
Performance of Internet Access Solutions in Mobile Ad Hoc Networks
Abstract. Although an autonomous mobile ad hoc network (MANET) is useful in many scenarios, a MANET connected to the Internet is more desirable. This interconnection is achieved by...
Ali Hamidian, Ulf Körner, Anders Nilsson
CORR
2006
Springer
108views Education» more  CORR 2006»
14 years 11 months ago
Static Analysis using Parameterised Boolean Equation Systems
The well-known problem of state space explosion in model checking is even more critical when applying this technique to programming languages, mainly due to the presence of complex...
María-del-Mar Gallardo, Christophe Joubert,...
MJ
2007
87views more  MJ 2007»
14 years 11 months ago
Using SAT-based techniques in power estimation
Recent algorithmic advances in Boolean satisfiability (SAT), along with highly efficient solver implementations, have enabled the successful deployment of SAT technology in a wi...
Assim Sagahyroon, Fadi A. Aloul