Sciweavers

10021 search results - page 1746 / 2005
» Adaptive information extraction
Sort
View
85
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 6 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
88
Voted
COCOON
2005
Springer
15 years 6 months ago
A Quadratic Lower Bound for Rocchio's Similarity-Based Relevance Feedback Algorithm
Rocchio’s similarity-based relevance feedback algorithm, one of the most important query reformation methods in information retrieval, is essentially an adaptive supervised lear...
Zhixiang Chen, Bin Fu
131
Voted
DBISP2P
2005
Springer
183views Database» more  DBISP2P 2005»
15 years 6 months ago
Database Selection and Result Merging in P2P Web Search
Intelligent Web search engines are extremely popular now. Currently, only commercial centralized search engines like Google can process terabytes of Web data. Alternative search en...
Sergey Chernov, Pavel Serdyukov, Matthias Bender, ...
97
Voted
EMISA
2005
Springer
15 years 6 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle
113
Voted
EMSOFT
2005
Springer
15 years 6 months ago
QoS control for optimality and safety
We propose a method for fine grain QoS control of real-time applications. The method allows adapting the overall system behavior by adequately setting the quality level parameter...
Jacques Combaz, Jean-Claude Fernandez, Thierry Lep...
« Prev « First page 1746 / 2005 Last » Next »