Sciweavers

706 search results - page 94 / 142
» Clone-Aware Configuration Management
Sort
View
EKAW
2008
Springer
14 years 17 days ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...
ENTER
2008
Springer
14 years 17 days ago
Evaluating Recommender Systems in Tourism - A Case Study from Austria
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
Markus Zanker, Matthias Fuchs, Wolfram Höpken...
LREC
2010
155views Education» more  LREC 2010»
14 years 7 days ago
Djangology: A Light-weight Web-based Tool for Distributed Collaborative Text Annotation
Manual text annotation is a resource-consuming endeavor necessary for NLP systems when they target new tasks or domains for which there are no existing annotated corpora. Distribu...
Emilia Apostolova, Sean Neilan, Gary An, Noriko To...
ERSA
2008
118views Hardware» more  ERSA 2008»
14 years 7 days ago
A Framework to Improve IP Portability on Reconfigurable Computers
- This paper presents a framework that improves the portability and ease-of-use issues of current Reconfigurable Computers (RCs). These two drawbacks should be solved in order for ...
Miaoqing Huang, Ivan Gonzalez, Sergio López...
IM
2007
14 years 6 days ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu