Sciweavers

9316 search results - page 1759 / 1864
» Analysis of traceback techniques
Sort
View
SIGIR
2009
ACM
15 years 6 months ago
Addressing morphological variation in alphabetic languages
The selection of indexing terms for representing documents is a key decision that limits how effective subsequent retrieval can be. Often stemming algorithms are used to normaliz...
Paul McNamee, Charles K. Nicholas, James Mayfield
SOUPS
2009
ACM
15 years 6 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
SAC
2010
ACM
15 years 6 months ago
General constant expressions for system programming languages
Most mainstream system programming languages provide support for builtin types, and extension mechanisms through userdefined types. They also come with a notion of constant expre...
Gabriel Dos Reis, Bjarne Stroustrup
AINA
2008
IEEE
15 years 6 months ago
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) have specific constraints and stringent requirements in contrast to traditional wired and wireless computer networks. Among these specific requireme...
Khurram Shahzad, Arshad Ali, N. D. Gohar
BMEI
2008
IEEE
15 years 6 months ago
Development of Epicardial Mapping System for Studying Atrial Fibrillation
Epicardial mapping system is an important tool for studying electrophysiological characteristics of atrial fibrillation (AF). AF is the most common arrhythmia and is becoming more...
Cuiwei Yang, Weijia Lu, Tuo Zhou, Xiaomei Wu, Zuxi...
« Prev « First page 1759 / 1864 Last » Next »