Sciweavers

2250 search results - page 438 / 450
» Authorizing applications in singularity
Sort
View
137
Voted
CIKM
2010
Springer
15 years 13 days ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...
123
Voted
HUC
2010
Springer
15 years 11 days ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
JACM
2010
137views more  JACM 2010»
15 years 9 days ago
Reconciling description logics and rules
Description logics (DLs) and rules are formalisms that emphasize different aspects of knowledge representation: whereas DLs are focused on specifying and reasoning about conceptual...
Boris Motik, Riccardo Rosati
JSAC
2010
119views more  JSAC 2010»
15 years 8 days ago
Low-Floor Detection/Decoding of LDPC-Coded Partial Response Channels
Abstract— There is a well-known error-floor phenomenon associated with iterative LDPC decoders which has delayed the use of LDPC codes in certain communication and storage syste...
Yang Han, William E. Ryan
JSS
2010
150views more  JSS 2010»
15 years 8 days ago
Towards a general purpose architecture for UI generation
Many software projects spend a significant proportion of their time developing the User Interface (UI), therefore any degree of automation in this area has clear benefits. Such au...
Richard Kennard, John Leaney