Sciweavers

1483 search results - page 262 / 297
» An Analysis of Factors Used in Search Engine Ranking
Sort
View
WWW
2007
ACM
14 years 9 months ago
Crawling multiple UDDI business registries
As Web services proliferate, size and magnitude of UDDI Business Registries (UBRs) are likely to increase. The ability to discover Web services of interest then across multiple UB...
Eyhab Al-Masri, Qusay H. Mahmoud
ISPASS
2006
IEEE
14 years 2 months ago
Modeling TCAM power for next generation network devices
Applications in Computer Networks often require high throughput access to large data structures for lookup and classification. Many advanced algorithms exist to speed these searc...
Banit Agrawal, Timothy Sherwood
C3S2E
2009
ACM
14 years 3 months ago
Radius selection algorithms for sphere decoding
The integer least squares problem arises from many applications such as communications, cryptography, and GPS. In this paper, we consider the sphere decoding method in communicati...
Fei Zhao, Sanzheng Qiao
ASE
2008
120views more  ASE 2008»
13 years 8 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
ICSE
2012
IEEE-ACM
11 years 11 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer