Sciweavers

1336 search results - page 219 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
MSWIM
2005
ACM
15 years 9 months ago
Huginn: a 3D visualizer for wireless ns-2 traces
Discrete-event network simulation is a major tool for the research and development of mobile ad-hoc networks (MANETs). These simulations are used for debugging, teaching, understa...
Björn Scheuermann, Holger Füßler, ...
147
Voted
SIGIR
2006
ACM
15 years 9 months ago
Mining dependency relations for query expansion in passage retrieval
Classical query expansion techniques such as the local context analysis (LCA) make use of term co-occurrence statistics to incorporate additional contextual terms for enhancing pa...
Renxu Sun, Chai-Huat Ong, Tat-Seng Chua
CLEF
2006
Springer
15 years 7 months ago
A Penalisation-Based Ranking Approach for the Mixed Monolingual Task of WebCLEF 2006
This paper presents an approach of a cross-lingual information retrieval which uses a ranking method based on a penalisation version of the Jaccard formula. The obtained results a...
David Pinto, Paolo Rosso, Ernesto Jiménez
147
Voted
KDD
2009
ACM
203views Data Mining» more  KDD 2009»
16 years 3 months ago
Characterizing individual communication patterns
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for char...
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amara...
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 9 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu