Sciweavers

7289 search results - page 1432 / 1458
» A Dependent Set Theory
Sort
View
JCIT
2008
159views more  JCIT 2008»
13 years 7 months ago
QoS-Aware Web Services Discovery with Trust Management
As the number of available Web services increases, there is a growing demand to find the service that best fits the user's requirements. Especially, when a set of services fu...
Yukyong Kim
CORR
2007
Springer
92views Education» more  CORR 2007»
13 years 7 months ago
Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
— Franceschetti et al. [1] have recently shown that per-node throughput in an extended (i.e., geographically expanding), ad hoc wireless network with Θ(n) randomly distributed n...
Awlok Josan, Mingyan Liu, David L. Neuhoff, S. San...
ISF
2006
118views more  ISF 2006»
13 years 7 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
JASIS
2006
164views more  JASIS 2006»
13 years 7 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
CVIU
2007
193views more  CVIU 2007»
13 years 7 months ago
Interpretation of complex scenes using dynamic tree-structure Bayesian networks
This paper addresses the problem of object detection and recognition in complex scenes, where objects are partially occluded. The approach presented herein is based on the hypothe...
Sinisa Todorovic, Michael C. Nechyba
« Prev « First page 1432 / 1458 Last » Next »