Sciweavers

4679 search results - page 819 / 936
» Modeling When Connections Are the Problem
Sort
View
86
Voted
DCOSS
2007
Springer
15 years 4 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
EPEW
2007
Springer
15 years 4 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
ICFCA
2007
Springer
15 years 4 months ago
Computing Intensions of Digital Library Collections
We model a Digital Library as a formal context in which objects are documents and attributes are terms describing documents contents. A formal concept is very close to the notion o...
Carlo Meghini, Nicolas Spyratos
89
Voted
UM
2007
Springer
15 years 4 months ago
Capturing User Interests by Both Exploitation and Exploration
Personalization is one of the important research issues in the areas of information retrieval and Web search. Providing personalized services that are tailored toward the specific...
Ka Cheung Sia, Shenghuo Zhu, Yun Chi, Koji Hino, B...
CSMR
2006
IEEE
15 years 4 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens