Sciweavers

116 search results - page 10 / 24
» Connecting effects and uniqueness with adoption
Sort
View
TSE
2010
125views more  TSE 2010»
13 years 5 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
PERCOM
2009
ACM
14 years 7 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
GLOBECOM
2008
IEEE
14 years 1 months ago
Modeling Mobility-Assisted Data Collection in Wireless Sensor Networks
—Exploiting mobility to enhance the performance of wireless sensor networks (WSNs), in terms of connectivity, coverage, and lifetime elongation, has recently been the focus of se...
Hisham M. Almasaeid, Ahmed E. Kamal
SEMWEB
2010
Springer
13 years 5 months ago
Enhancing the Open-Domain Classification of Named Entity Using Linked Open Data
Many applications make use of named entity classification. Machine learning is the preferred technique adopted for many named entity classification methods where the choice of feat...
Yuan Ni, Lei Zhang, Zhaoming Qiu, Chen Wang
PERCOM
2006
ACM
14 years 7 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...