Sciweavers

3630 search results - page 712 / 726
» How to Compare Treebanks
Sort
View
NAS
2010
IEEE
14 years 8 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
PDP
2010
IEEE
14 years 8 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
PROCEDIA
2010
344views more  PROCEDIA 2010»
14 years 8 months ago
Towards high-quality, untangled meshes via a force-directed graph embedding approach
High quality meshes are crucial for the solution of partial differential equations (PDEs) via the finite element method (or other PDE solvers). The accuracy of the PDE solution,...
Sanjukta Bhowmick, Suzanne M. Shontz
PVLDB
2010
342views more  PVLDB 2010»
14 years 8 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
RAID
2010
Springer
14 years 8 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...