Sciweavers

7329 search results - page 1390 / 1466
» Network Extractor Protocols
Sort
View
CONTEXT
2007
Springer
15 years 7 months ago
A Personalized Retrieval Model based on Influence Diagrams
Abstract. A key challenge in information retrieval is the use of contextual evidence within ad-hoc retrieval. Our contribution is particularly based on the belief that contextual r...
Nesrine Zemirli, Lynda Tamine, Mohand Boughanem
118
Voted
EATIS
2007
ACM
15 years 7 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
127
Voted
EXPCS
2007
15 years 7 months ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags
157
Voted
HIPC
2007
Springer
15 years 7 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
111
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
Scalable, high-performance NIC-based all-to-all broadcast over Myrinet/GM
All-to-all broadcast is one of the common collective operations that involve dense communication between all processes in a parallel program. Previously, programmable Network Inte...
Weikuan Yu, Dhabaleswar K. Panda, Darius Buntinas
« Prev « First page 1390 / 1466 Last » Next »