Sciweavers

12131 search results - page 2089 / 2427
» Introduction to Modeling and Simulation
Sort
View
CCS
2007
ACM
15 years 11 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
146
Voted
CIT
2007
Springer
15 years 11 months ago
An 802.11 Based MAC Protocol for Providing QoS to Real Time Applications
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Mayank Mishra, Anirudha Sahoo
CONTEXT
2007
Springer
15 years 11 months ago
A Qualitative Look at Eye-tracking for Implicit Relevance Feedback
Our goal in this study was to explore the potentials of extracting features from eye-tracking data that have the potential to improve performance in implicit relevance feedback. We...
Kirsten Kirkegaard Moe, Jeanette M. Jensen, Birger...
CONTEXT
2007
Springer
15 years 11 months ago
Coping with Unconsidered Context of Formalized Knowledge
The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
Stefan Mandl, Bernd Ludwig
121
Voted
CONTEXT
2007
Springer
15 years 11 months ago
Thai Text Coherence Structuring with Coordinating and Subordinating Relations for Text Summarization
Text summarization with the consideration of coherence can be achieved by using discourse processing with the Rhetorical Structure Theory (RST). Additional problems on relational a...
Thana Sukvaree, Asanee Kawtrakul, Jean Caelen
« Prev « First page 2089 / 2427 Last » Next »