Sciweavers

286 search results - page 44 / 58
» An Empirical Comparison of Dynamic Impact Analysis Algorithm...
Sort
View
WINET
2010
178views more  WINET 2010»
14 years 4 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
BIOID
2008
157views Biometrics» more  BIOID 2008»
14 years 11 months ago
Modeling Marginal Distributions of Gabor Coefficients: Application to Biometric Template Reduction
Abstract. Gabor filters have demonstrated their effectiveness in automatic face recognition. However, one drawback of Gabor-based face representations is the huge amount of data th...
Daniel González-Jiménez, José...
BIS
2008
134views Business» more  BIS 2008»
14 years 11 months ago
Trustlet, Open Research on Trust Metrics
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially beneficial in situations where most users are unknown ...
Paolo Massa, Kasper Souren
AOSD
2008
ACM
14 years 11 months ago
AJANA: a general framework for source-code-level interprocedural dataflow analysis of AspectJ software
Aspect-oriented software presents new challenges for the designers of static analyses. Our work aims to establish systematic foundations for dataflow analysis of AspectJ software....
Guoqing Xu, Atanas Rountev
PDP
2006
IEEE
15 years 3 months ago
A Distributed Approach to Construction of Topology Mismatching Aware P2P Overlays in Wireless Ad Hoc Networks
Peer-to-Peer computing is mainly based on the virtual overlay network constructed in the application layer. Often, there is topology mismatching between the overlay network and th...
Yu Huang 0002, Beihong Jin, Jiannong Cao