Sciweavers

25111 search results - page 4867 / 5023
» Information Systems
Sort
View
DMIN
2008
158views Data Mining» more  DMIN 2008»
15 years 1 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
AAAI
1996
15 years 1 months ago
What Is Planning in the Presence of Sensing?
The Airport Example The Omelette Example Copyright c 1996 American Association for Artificial Intelligence. All rights reserved. Despite the existence of programs that are able to ...
Hector J. Levesque
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 3 days ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
CORR
2010
Springer
259views Education» more  CORR 2010»
14 years 12 months ago
Community Detection in Networks: The Leader-Follower Algorithm
Natural networks such as those between humans observed through their interactions or biological networks predicted based on various experimental measurements contain a wealth of i...
Devavrat Shah, Tauhid Zaman
CN
2006
70views more  CN 2006»
14 years 12 months ago
Preventing persistent oscillations and loops in IBGP configuration with route reflection
Abstract-- Internal Border Gateway Protocol (IBGP) is responsible for distributing external reachability information, obtained via External-BGP (EBGP) sessions, within an autonomou...
Anuj Rawat, Mark A. Shayman
« Prev « First page 4867 / 5023 Last » Next »