Sciweavers

1444 search results - page 74 / 289
» The end of users
Sort
View
ADBIS
1997
Springer
146views Database» more  ADBIS 1997»
15 years 4 months ago
S-Index: a Hybrid Structure for Text Retrieval
Today, two classes of indexing methods enjoying wide applicability are the Inverted Index and the Superimposed Coding based Signature File (SC-SF). The former is most efficient i...
Dimitrios Dervos, P. Linardis, Yannis Manolopoulos
93
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 2 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
GLOBECOM
2008
IEEE
15 years 1 months ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
144
Voted
PUC
2011
14 years 7 months ago
Toward a cooperative programming framework for context-aware applications
OPEN is an ontology-based programming framework for rapid prototyping, sharing, and personalization of context-aware applications. Unlike previous systems that provide programming ...
Bin Guo, Daqing Zhang, Michita Imai
75
Voted
KES
2007
Springer
15 years 6 months ago
NBM and WNBM: Algorithms and Evaluation for Personalizing Information Retrieval in METIORE
The current Information Retrieval Systems return hundreds or thousands of documents in response to a query. Users consider only the first 20 or 30, but documents are often sorted a...
David Bueno, Ricardo Conejo, Amos David, Cristina ...