Sciweavers

23590 search results - page 4564 / 4718
» Algorithm Performance Contest
Sort
View
SIGIR
2005
ACM
15 years 10 months ago
A study of relevance propagation for web search
Different from traditional information retrieval, both content and structure are critical to the success of Web information retrieval. In recent years, many relevance propagation ...
Tao Qin, Tie-Yan Liu, Xu-Dong Zhang, Zheng Chen, W...
SIGIR
2005
ACM
15 years 10 months ago
Detecting dominant locations from search queries
Accurately and effectively detecting the locations where search queries are truly about has huge potential impact on increasing search relevance. In this paper, we define a search...
Lee Wang, Chuang Wang, Xing Xie, Josh Forman, Yans...
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...
AIIA
2005
Springer
15 years 10 months ago
Towards Fault-Tolerant Formal Concept Analysis
Given Boolean data sets which record properties of objects, Formal Concept Analysis is a well-known approach for knowledge discovery. Recent application domains, e.g., for very lar...
Ruggero G. Pensa, Jean-François Boulicaut
CCS
2005
ACM
15 years 10 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
« Prev « First page 4564 / 4718 Last » Next »