Sciweavers

22193 search results - page 4186 / 4439
» Multiple Restricted Multiplication
Sort
View
137
Voted
CIDR
2009
129views Algorithms» more  CIDR 2009»
15 years 4 months ago
Extracting and Querying a Comprehensive Web Database
Recent research in domain-independent information extraction holds the promise of an automatically-constructed structured database derived from the Web. A query system based on th...
Michael J. Cafarella
136
Voted
CLEF
2009
Springer
15 years 4 months ago
Multilingual Query Expansion for CLEF Adhoc-TEL
In this paper we will briefly describe the approaches taken by the Cheshire (Berkeley) Group for the CLEF Adhoc-TEL 2009 tasks (Mono and Bilingual retrieval). Recognizing that man...
Ray R. Larson
ECRTS
2010
IEEE
15 years 4 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
160
Voted
COMAD
2009
15 years 4 months ago
Information Integration: Challenges and Approaches
The problem of information integration is discussed in the context of answering a query over the web. Querying the web requires that information from different web and other sourc...
Sharma Chakravarthy
137
Voted
CONEXT
2009
ACM
15 years 4 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
« Prev « First page 4186 / 4439 Last » Next »