Sciweavers

8413 search results - page 1581 / 1683
» Ordering Problem Subgoals
Sort
View
SOUPS
2005
ACM
15 years 9 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
161
Voted
WIDM
2005
ACM
15 years 9 months ago
Exploiting native XML indexing techniques for XML retrieval in relational database systems
In XML retrieval, two distinct approaches have been established and pursued without much cross-fertilization taking place so far. On the one hand, native XML databases tailored to...
Felix Weigel, Klaus U. Schulz, Holger Meuss
WMASH
2005
ACM
15 years 9 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...
110
Voted
AI
2005
Springer
15 years 9 months ago
Instance Cloning Local Naive Bayes
The instance-based k-nearest neighbor algorithm (KNN)[1] is an effective classification model. Its classification is simply based on a vote within the neighborhood, consisting o...
Liangxiao Jiang, Harry Zhang, Jiang Su
« Prev « First page 1581 / 1683 Last » Next »