Sciweavers

1135 search results - page 171 / 227
» Using Process Mining to Analyze and Improve Process Flexibil...
Sort
View
JSA
2006
86views more  JSA 2006»
14 years 9 months ago
High-performance adaptive routing for networks with arbitrary topology
A strategy to implement adaptive routing in irregular networks is presented and analyzed in this work. A simple and widely applicable deadlock avoidance method, applied to a ring ...
Valentin Puente, José A. Gregorio, Fernando...
IPM
2007
114views more  IPM 2007»
14 years 9 months ago
s-grams: Defining generalized n-grams for information retrieval
For European languages, n-gram has proved to be the cost effective alternative to morphological processing during indexing task and it has been studied and analyzed extensively us...
Anni Järvelin, Antti Järvelin, Kalervo J...
COMCOM
2011
14 years 4 months ago
Palmtree: An IP alias resolution algorithm with linear probing complexity
Internet topology mapping studies utilize large scale topology maps to analyze various characteristics of the Internet. IP alias resolution, the task of mapping IP addresses to th...
M. Engin Tozal, Kamil Saraç
HCI
2011
14 years 1 months ago
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues
We studied communication patterns in face-to-face dialogues between people for the purpose of identifying conversation features that can be exploited to improve human-computer inte...
Masashi Inoue, Toshio Irino, Nobuhiro Furuyama, Ry...
AFRICACRYPT
2009
Springer
15 years 1 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi