Sciweavers

43 search results - page 8 / 9
» Analysis of the INEX 2009 Ad Hoc Track Results
Sort
View
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
14 years 2 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
CSEE
2009
Springer
14 years 2 months ago
Evaluating Software Inspection Cognition Levels Using Bloom's Taxonomy
This paper reports on results from a pilot study that used Bloom’s Taxonomy to observe cognition levels during software inspections conducted by undergraduate computer science a...
David A. McMeekin, Brian R. von Konsky, Elizabeth ...
WOWMOM
2009
ACM
191views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Multi-channel spectrum-agile MAC protocol with adaptive load control
Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
Fan Wang, Marwan Krunz
NBIS
2009
Springer
14 years 2 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
MOBIHOC
2004
ACM
14 years 7 months ago
On greedy geographic routing algorithms in sensing-covered networks
Greedy geographic routing is attractive in wireless sensor networks due to its efficiency and scalability. However, greedy geographic routing may incur long routing paths or even ...
Guoliang Xing, Chenyang Lu, Robert Pless, Qingfeng...