Sciweavers

6258 search results - page 1090 / 1252
» Applied Text Generation
Sort
View
IVS
2010
44views more  IVS 2010»
14 years 11 months ago
Generalized scatter plots
Scatter Plots are one of the most powerful and most widely used techniques for visual data exploration. A well-known problem is that scatter plots often have a high degree of overl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Halld...
JDCTA
2010
164views more  JDCTA 2010»
14 years 11 months ago
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing
With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There ...
Lu Lu, Xiuxia Quan
JDCTA
2010
171views more  JDCTA 2010»
14 years 11 months ago
A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database
To manage the complicated data such as recursive elements, multiply namespaces, repeatable structures, extended elements and attributes in the XML Binding documents of distance ed...
Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
JMLR
2010
134views more  JMLR 2010»
14 years 11 months ago
Half Transductive Ranking
We study the standard retrieval task of ranking a fixed set of items given a previously unseen query and pose it as the half transductive ranking problem. The task is transductive...
Bing Bai, Jason Weston, David Grangier, Ronan Coll...
« Prev « First page 1090 / 1252 Last » Next »