Sciweavers

1687 search results - page 192 / 338
» Which pointer analysis should I use
Sort
View
ICWS
2008
IEEE
15 years 6 months ago
An Adaptive Service Selection Approach to Service Composition
In service computing, the behavior of a service may evolve. When an organization develops a service-oriented application in which certain services are provided by external partner...
Lijun Mei, Wing Kwong Chan, T. H. Tse
DKE
2007
116views more  DKE 2007»
15 years 4 months ago
A concurrent rule scheduling algorithm for active rules
The use of rules in a distributed environment creates new challenges for the development of active rule execution models. In particular, since a single event can trigger multiple ...
Ying Jin, Susan Darling Urban, Suzanne W. Dietrich
INFOCOM
2011
IEEE
14 years 8 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
CIVR
2008
Springer
271views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Multiple feature fusion by subspace learning
Since the emergence of extensive multimedia data, feature fusion has been more and more important for image and video retrieval, indexing and annotation. Existing feature fusion t...
Yun Fu, Liangliang Cao, Guodong Guo, Thomas S. Hua...
155
Voted
DIS
1999
Springer
15 years 8 months ago
The Melting Pot of Automated Discovery: Principles for a New Science
After two decades of research on automated discovery, many principles are shaping up as a foundation of discovery science. In this paper we view discovery science as automation of ...
Jan M. Zytkow