Sciweavers

256 search results - page 38 / 52
» Computing by Observing Bio-systems: The Case of Sticker Syst...
Sort
View
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 2 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
ICDE
2009
IEEE
144views Database» more  ICDE 2009»
16 years 1 months ago
Reachability Indexes for Relational Keyword Search
Due to its considerable ease of use, relational keyword search (R-KWS) has become increasingly popular. Its simplicity, however, comes at the cost of intensive query processing. Sp...
Alexander Markowetz, Yin Yang, Dimitris Papadias
WCNC
2008
IEEE
15 years 6 months ago
Joint Power and Bandwidth Allocation in Multihop Wireless Networks
Abstract—This paper considers power and bandwidth allocation to maximize the end-to-end rate in a multihop wireless network. Assuming an orthogonal frequency division multiplexin...
Deqiang Chen, J. Nicholas Laneman
LICS
2007
IEEE
15 years 6 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba
LCN
2005
IEEE
15 years 5 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed