: Advances in data storage and image acquisition technologies have enabled the creation of large image datasets. In this scenario, it is necessary to develop appropriate informatio...
This paper presents a search architecture that combines classical search techniques with spread activation techniques applied to a semantic model of a given domain. Given an ontol...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patt...
Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Ka...
At many universities, web lectures have become an integral part of the e-learning portfolio over the last few years. While many aspects of the technology involved, like automatic ...
—As current software systems evolve continuously, both the application and its user interface (UI) have to be adapted. However, UI code is often scattered through and entangled w...