Sciweavers

10909 search results - page 20 / 2182
» Evaluating Backup Algorithms
Sort
View
CLIN
2001
14 years 11 months ago
Accurate Stemming of Dutch for Text Classification
This paper investigates the use of stemming for classification of Dutch (email) texts. We introduce a stemmer, which combines dictionary lookup (implemented efficiently as a finit...
Tanja Gaustad, Gosse Bouma
74
Voted
ISF
2008
119views more  ISF 2008»
14 years 9 months ago
A decision support system for locating VHF/UHF radio jammer systems on the terrain
In this study, a mathematical model is suggested concerning the location of VHF/UHF frequency radio jammer systems to the terrain parts to conduct single frequency or sequential fr...
Cevriye Gencer, Emel Kizilkaya Aydogan, Coskun Cel...
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 2 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
ISCC
2005
IEEE
15 years 3 months ago
Improving Survivability through Traffic Engineering in MPLS Networks
The volume of higher priority Internet applications is increasing as the Internet continues to evolve. Customers require Quality of Service (QoS) guarantees with not only guarante...
Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. H...
IJCAI
1989
14 years 10 months ago
The Reason for the Benefits of Minimax Search
based on an abstract concept of quiescence. In the following we sketch this and a related model, describe the design of our experiments, and present the results of our simulation s...
Anton Scheucher, Hermann Kaindl