Sciweavers

1054 search results - page 195 / 211
» group 2005
Sort
View
MSWIM
2005
ACM
15 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
SIGDOC
2005
ACM
15 years 3 months ago
User-centred design and evaluation of ubiquitous services
Theoretical and technological progress has revived the interest in the design of services for the support of co-located human-human communication and collaboration, witnessing the...
Rahat Iqbal, Janienke Sturm, Olga A. Kulyk, Jimmy ...
SIGIR
2005
ACM
15 years 3 months ago
A database centric view of semantic image annotation and retrieval
We introduce a new model for semantic annotation and retrieval from image databases. The new model is based on a probabilistic formulation that poses annotation and retrieval as c...
Gustavo Carneiro, Nuno Vasconcelos
SIGMETRICS
2005
ACM
117views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
Classifying scheduling policies with respect to higher moments of conditional response time
In addition to providing small mean response times, modern applications seek to provide users predictable service and, in some cases, Quality of Service (QoS) guarantees. In order...
Adam Wierman, Mor Harchol-Balter
SIGSOFT
2005
ACM
15 years 3 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek