Sciweavers

8636 search results - page 1473 / 1728
» How Developers Copy
Sort
View
158
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Convex approximation algorithms for back-pressure power control of wireless multi-hop networks
Cross-layer design and operation of wireless networks has attracted significant interest in the last decade, yet some basic problems in the area remain unsolved. In this paper, w...
Evaggelia Matskani, Nikos D. Sidiropoulos, Leandro...
123
Voted
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
14 years 7 months ago
Discovering popular routes from trajectories
—The booming industry of location-based services has accumulated a huge collection of users’ location trajectories of driving, cycling, hiking, etc. In this work, we investigat...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou
210
Voted
AINA
2011
IEEE
14 years 7 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
AWIC
2011
Springer
14 years 7 months ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
CGO
2011
IEEE
14 years 7 months ago
A trace-based Java JIT compiler retrofitted from a method-based compiler
—This paper describes our trace-based JIT compiler (trace-JIT) for Java developed from a production-quality method-based JIT compiler (method-JIT). We first describe the design a...
Hiroshi Inoue, Hiroshige Hayashizaki, Peng Wu, Tos...
« Prev « First page 1473 / 1728 Last » Next »