Sciweavers

9503 search results - page 1852 / 1901
» Authenticated System Calls
Sort
View
ICWN
2003
14 years 11 days ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
USITS
2001
14 years 11 days ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
NDQA
2003
129views Education» more  NDQA 2003»
14 years 11 days ago
Knowledge Tracking: Answering Implicit Questions
Research on Question Answering has produced an arsenal of useful techniques for detecting answers that are explicitly present in the text of a collection of documents. To move bey...
Reinhard Stolle, Daniel G. Bobrow, Cleo Condoravdi...
PSSS
2003
14 years 11 days ago
Representing Contextualized Data using Semantic Web Tools
: RDF-based tools promise to provide a base for reasoning about metadata and about situated data—data describing entities situated in time and space—that is superior to alterna...
Robert M. MacGregor, In-Young Ko
AAAI
2000
14 years 10 days ago
Recognizing End-User Transactions in Performance Management
Providing good quality of service (e.g., low response times) in distributed computer systems requires measuring enduser perceptions of performance. Unfortunately, such measures ar...
Joseph L. Hellerstein, T. S. Jayram, Irina Rish
« Prev « First page 1852 / 1901 Last » Next »