Sciweavers

12836 search results - page 2517 / 2568
» Generalization Methods in Bioinformatics
Sort
View
SIGIR
2008
ACM
15 years 3 months ago
Towards breaking the quality curse.: a web-querying approach to web people search
Searching for people on the Web is one of the most common query types to the web search engines today. However, when a person name is queried, the returned webpages often contain ...
Dmitri V. Kalashnikov, Rabia Nuray-Turan, Sharad M...
SIGIR
2008
ACM
15 years 3 months ago
A unified and discriminative model for query refinement
This paper addresses the issue of query refinement, which involves reformulating ill-formed search queries in order to enhance relevance of search results. Query refinement typica...
Jiafeng Guo, Gu Xu, Hang Li, Xueqi Cheng
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 3 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
ADHOC
2005
119views more  ADHOC 2005»
15 years 3 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou
IJISEC
2007
61views more  IJISEC 2007»
15 years 3 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
« Prev « First page 2517 / 2568 Last » Next »