Sciweavers

4049 search results - page 764 / 810
» Neural Network Trainer through Computer Networks
Sort
View
89
Voted
SIGIR
2003
ACM
15 years 2 months ago
Question classification using support vector machines
Question classification is very important for question answering. This paper presents our research work on automatic question classification through machine learning approaches. W...
Dell Zhang, Wee Sun Lee
WMASH
2003
ACM
15 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
DEXA
2003
Springer
106views Database» more  DEXA 2003»
15 years 2 months ago
Location Query Based on Moving Behaviors
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communicatio...
Ming-Hui Jin, Eric Hsiao-Kuang Wu, Jorng-Tzong Hor...
80
Voted
EUROSYS
2010
ACM
15 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
89
Voted
IWCMC
2009
ACM
15 years 2 months ago
Cross-layer resource allocation scheme for multi-band high rate UWB systems
Abstract- In this paper, we investigate the use of a crosslayer allocation mechanism for the high-rate ultra-wideband (UWB) systems. The aim of this paper is twofold. First, throug...
Ayman Khalil, Matthieu Crussière, Jean-Fran...