Sciweavers

8468 search results - page 1430 / 1694
» The Technology of Data Stashing
Sort
View
ISCC
2002
IEEE
15 years 4 months ago
A new approach to construct multicast trees in MPLS networks
In this paper1 , we present a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to...
Ali Boudani, Bernard Cousin
WORDS
2002
IEEE
15 years 4 months ago
Jini Meets Embedded Control Networking: A Case Study in Portability Failure
The Robust Self-Configuring Embedded Systems (RoSES) project seeks to achieve graceful degradation through software reconfiguration. To accomplish this goal, systems must automati...
Meredith Beveridge, Philip Koopman
100
Voted
WWW
2010
ACM
15 years 4 months ago
Web-scale knowledge extraction from semi-structured tables
A wealth of knowledge is encoded in the form of tables on the World Wide Web. We propose a classification algorithm and a rich feature set for automatically recognizing layout tab...
Eric Crestan, Patrick Pantel
DAS
2010
Springer
15 years 4 months ago
Detecting and recognizing tables in spreadsheets
Detecting tables in a spreadsheet is the first step needed to make spreadsheet documents accessible to individuals with visual disabilities. Techniques to enable aural presentati...
Iyad Abu Doush, Enrico Pontelli
ITS
2010
Springer
168views Multimedia» more  ITS 2010»
15 years 3 months ago
Computational Workflows for Assessing Student Learning
The use of technology for instruction, and the enormous amount of information available for consumption, places a considerable burden on instructors who must learn to integrate app...
Jun Ma, Erin Shaw, Jihie Kim
« Prev « First page 1430 / 1694 Last » Next »