Sciweavers

12493 search results - page 2360 / 2499
» Information Access in the Web
Sort
View
INFOCOM
2007
IEEE
15 years 7 months ago
Service Charge and Energy-Aware Vertical Handoff in Integrated IEEE 802.16e/802.11 Networks
Abstract— This paper considers two issues arising in an integrated IEEE 802.16e/802.11 network: 1) finding a possible network, which mobile station (MSTA) can switch to, and 2) ...
Youngkyu Choi, Sunghyun Choi
MOBIQUITOUS
2007
IEEE
15 years 7 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
CCS
2007
ACM
15 years 7 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 7 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua
DAARC
2007
Springer
120views Algorithms» more  DAARC 2007»
15 years 7 months ago
Empirically Assessing Effects of the Right Frontier Constraint
In a questionnaire study the effects of discourse structural information on resolving inter-sentential anaphora were investigated. The Right Frontier Constraint, first proposed by ...
Anke Holler, Lisa Irmen
« Prev « First page 2360 / 2499 Last » Next »