Sciweavers

2629 search results - page 523 / 526
» Build a Computer from Scratch
Sort
View
CN
1999
106views more  CN 1999»
13 years 7 months ago
UIML: An Appliance-Independent XML User Interface Language
Today's Internet appliances feature user interface technologies almost unknown a few years ago: touch screens, styli, handwriting and voice recognition, speech synthesis, tin...
Marc Abrams, Constantinos Phanouriou, Alan L. Bato...
TON
2002
112views more  TON 2002»
13 years 7 months ago
Pricing in multiservice loss networks: static pricing, asymptotic optimality, and demand substitution effects
We consider a communication network with fixed routing that can accommodate multiple service classes, differing in bandwidth requirements, demand pattern, call duration, and routin...
Ioannis Ch. Paschalidis, Yong Liu
VLDB
2002
ACM
193views Database» more  VLDB 2002»
13 years 7 months ago
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex
Automated recommendation (e.g., personalized product recommendation on an ecommerce web site) is an increasingly valuable service associated with many databases--typically online ...
Dan Cosley, Steve Lawrence, David M. Pennock
RTAS
2010
IEEE
13 years 6 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 6 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...