Sciweavers

8243 search results - page 1505 / 1649
» Can We Manage Trust
Sort
View
ECLIPSE
2005
ACM
14 years 23 hour ago
Coping with an open bug repository
Most open source software development projects include an open bug repository—one to which users of the software can gain full access—that is used to report and track problems...
John Anvik, Lyndon Hiew, Gail C. Murphy
BDA
2007
13 years 11 months ago
Towards Action-Oriented Continuous Queries in Pervasive Systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be use...
Yann Gripay, Frédérique Laforest, Je...
AAAI
1997
13 years 11 months ago
Deep Blue is Still an Infant
Webelieve that by the time of the workshopDeep Blue will havelost another matchto Garry Kasparov, showinglittle improvementover the previous one. But even if it is indeed a "...
Robert Levinson, Jeff Wilkinson
DSS
2008
186views more  DSS 2008»
13 years 10 months ago
A machine learning approach to web page filtering using content and structure analysis
As the Web continues to grow, it has become increasingly difficult to search for relevant information using traditional search engines. Topic-specific search engines provide an al...
Michael Chau, Hsinchun Chen
TWC
2008
154views more  TWC 2008»
13 years 10 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
« Prev « First page 1505 / 1649 Last » Next »