Sciweavers

1759 search results - page 274 / 352
» Using term informativeness for named entity detection
Sort
View
COMSWARE
2007
IEEE
15 years 4 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
CSCW
2006
ACM
15 years 3 months ago
The chasms of CSCW: a citation graph analysis of the CSCW conference
The CSCW conference is celebrating its 20th birthday. This is a perfect time to analyze the coherence of the field, to examine whether it has a solid core or sub-communities, and ...
Michal Jacovi, Vladimir Soroka, Gail Gilboa-Freedm...
CEC
2005
IEEE
15 years 3 months ago
Constraint quadratic approximation operator for treating equality constraints with genetic algorithms
Abstract- This paper presents a new operator for genetic algorithms that enhances their convergence in the case of nonlinear problems with nonlinear equality constraints. The propo...
Elizabeth F. Wanner, Frederico G. Guimarães...
MM
2004
ACM
106views Multimedia» more  MM 2004»
15 years 3 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
CIKM
2004
Springer
15 years 3 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu