Sciweavers

256 search results - page 38 / 52
» Computing by Observing Bio-systems: The Case of Sticker Syst...
Sort
View
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
11 years 11 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
ICDE
2009
IEEE
144views Database» more  ICDE 2009»
14 years 10 months ago
Reachability Indexes for Relational Keyword Search
Due to its considerable ease of use, relational keyword search (R-KWS) has become increasingly popular. Its simplicity, however, comes at the cost of intensive query processing. Sp...
Alexander Markowetz, Yin Yang, Dimitris Papadias
WCNC
2008
IEEE
14 years 2 months ago
Joint Power and Bandwidth Allocation in Multihop Wireless Networks
Abstract—This paper considers power and bandwidth allocation to maximize the end-to-end rate in a multihop wireless network. Assuming an orthogonal frequency division multiplexin...
Deqiang Chen, J. Nicholas Laneman
LICS
2007
IEEE
14 years 2 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba
LCN
2005
IEEE
14 years 2 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed