Sciweavers

9503 search results - page 1852 / 1901
» Authenticated System Calls
Sort
View
108
Voted
ICWN
2003
15 years 2 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
USITS
2001
15 years 2 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
98
Voted
NDQA
2003
129views Education» more  NDQA 2003»
15 years 2 months ago
Knowledge Tracking: Answering Implicit Questions
Research on Question Answering has produced an arsenal of useful techniques for detecting answers that are explicitly present in the text of a collection of documents. To move bey...
Reinhard Stolle, Daniel G. Bobrow, Cleo Condoravdi...
112
Voted
PSSS
2003
15 years 2 months ago
Representing Contextualized Data using Semantic Web Tools
: RDF-based tools promise to provide a base for reasoning about metadata and about situated data—data describing entities situated in time and space—that is superior to alterna...
Robert M. MacGregor, In-Young Ko
91
Voted
AAAI
2000
15 years 2 months ago
Recognizing End-User Transactions in Performance Management
Providing good quality of service (e.g., low response times) in distributed computer systems requires measuring enduser perceptions of performance. Unfortunately, such measures ar...
Joseph L. Hellerstein, T. S. Jayram, Irina Rish
« Prev « First page 1852 / 1901 Last » Next »