Sciweavers

8647 search results - page 1469 / 1730
» The Container Selection Problem
Sort
View
124
Voted
FQAS
2006
Springer
186views Database» more  FQAS 2006»
15 years 7 months ago
Query Phrase Suggestion from Topically Tagged Session Logs
Searchers' difficulty in formulating effective queries for their information needs is well known. Analysis of search session logs shows that users often pose short, vague quer...
Eric C. Jensen, Steven M. Beitzel, Abdur Chowdhury...
130
Voted
GECCO
2006
Springer
175views Optimization» more  GECCO 2006»
15 years 7 months ago
A computational theory of adaptive behavior based on an evolutionary reinforcement mechanism
Two mathematical and two computational theories from the field of human and animal learning are combined to produce a more general theory of adaptive behavior. The cornerstone of ...
J. J. McDowell, Paul L. Soto, Jesse Dallery, Saule...
129
Voted
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 7 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
147
Voted
ATAL
2003
Springer
15 years 7 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
117
Voted
CCGRID
2001
IEEE
15 years 7 months ago
xBSP: An Efficient BSP Implementation for clan
Virtual Interface Architecture(VIA) is a light-weight protocol for protected user-level zero-copy communication. In spite of high performance of VIA, the previous MPI implementati...
Yang-Suk Kee, Soonhoi Ha
« Prev « First page 1469 / 1730 Last » Next »