Sciweavers

8479 search results - page 1595 / 1696
» Data Extraction from Web Data Sources
Sort
View
160
Voted
AMKM
2003
Springer
15 years 7 months ago
Agentized, Contextualized Filters for Information Management
Every time a user engaged in work reads or writes, the user spontaneously generates new information needs: to understand the text he or she is reading or to supply more substance ...
David A. Evans, Gregory Grefenstette, Yan Qu, Jame...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 7 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
121
Voted
INFOCOM
2002
IEEE
15 years 7 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das
CIMAGING
2008
123views Hardware» more  CIMAGING 2008»
15 years 4 months ago
Non-homogeneous ICD optimization for targeted reconstruction of volumetric CT
Medical imaging typically requires the reconstruction of a limited region of interest (ROI) to obtain a high resolution image of the anatomy of interest. Although targeted reconst...
Zhou Yu, Jean-Baptiste Thibault, Charles A. Bouman...
128
Voted
WICON
2008
15 years 4 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan
« Prev « First page 1595 / 1696 Last » Next »