Sciweavers

6514 search results - page 1056 / 1303
» Low-Knowledge Algorithm Control
Sort
View
142
Voted
WISEC
2009
ACM
15 years 9 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
121
Voted
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
15 years 9 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun
137
Voted
EICS
2009
ACM
15 years 9 months ago
Input evaluation of an eye-gaze-guided interface: Kalman filter vs. velocity threshold eye movement identification
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided inter...
Do Hyong Koh, Sandeep A. Munikrishne Gowda, Oleg V...
134
Voted
RECSYS
2009
ACM
15 years 9 months ago
Learning to recommend with trust and distrust relationships
With the exponential growth of Web contents, Recommender System has become indispensable for discovering new information that might interest Web users. Despite their success in th...
Hao Ma, Michael R. Lyu, Irwin King
122
Voted
RECSYS
2009
ACM
15 years 9 months ago
Conceptual recommender system for CiteSeerX
Short search engine queries do not provide contextual information, making it difficult for traditional search engines to understand what users are really requesting. One approach ...
Ajith Kodakateri Pudhiyaveetil, Susan Gauch, Hiep ...
« Prev « First page 1056 / 1303 Last » Next »