Sciweavers

7839 search results - page 259 / 1568
» What's there and what's not
Sort
View
TON
2010
168views more  TON 2010»
14 years 8 months ago
Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation
Abstract--We present a number of significant engineering insights on what makes a good configuration for medium- to largesize wireless mesh networks (WMNs) when the objective funct...
Jun Luo, Catherine Rosenberg, André Girard
HCI
2011
14 years 5 months ago
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation
Almost 20% of big earthquakes in the world occur in Japan. It becomes impossible for private companies and governments to carry out their business if they suffer from severe damage...
Ryuhei Kaneko, Yoshio Nakatani
JOLLI
2011
84views more  JOLLI 2011»
14 years 4 months ago
Semantically Restricted Argument Dependencies
This paper presents a new take on how argument dependencies in natural language are established and constrained. The paper starts with a rather standard view that (quantificationa...
Alastair Butler
ASUNAM
2011
IEEE
14 years 1 months ago
Probabilistic Subgraph Matching on Huge Social Networks
—Users querying massive social networks or RDF databases are often not 100% certain about what they are looking for due to the complexity of the query or heterogeneity of the dat...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
ESORICS
2011
Springer
14 years 1 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans