Sciweavers

11538 search results - page 2269 / 2308
» From Text to Knowledge
Sort
View
CORR
2007
Springer
130views Education» more  CORR 2007»
15 years 4 months ago
An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF
Admission control as a mechanism for providing QoS requires an accurate description of the requested flow as well as already admitted flows. Since 802.11 WLAN capacity is shared...
Preetam Patil, Varsha Apte
JISE
2008
77views more  JISE 2008»
15 years 4 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
JOT
2008
108views more  JOT 2008»
15 years 4 months ago
Requirements analysis for large scale systems
All readers of this paper most likely have knowledge of the software requirements discipline and of the use case notation, however not everyone is aware that with the progress of ...
Roger Johnson, George Roussos, Luca Vetti Tagliati
DKE
2007
130views more  DKE 2007»
15 years 4 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
ECCC
2007
127views more  ECCC 2007»
15 years 4 months ago
Universal Semantic Communication I
Is it possible for two intelligent beings to communicate meaningfully, without any common language or background? This question has interest on its own, but is especially relevant...
Brendan Juba, Madhu Sudan
« Prev « First page 2269 / 2308 Last » Next »