Sciweavers

3474 search results - page 600 / 695
» Data Management in RFID Applications
Sort
View
APLAS
2009
ACM
15 years 11 months ago
Asymptotic Resource Usage Bounds
When describing the resource usage of a program, it is usual to talk in asymptotic terms, such as the well-known “big O” notation, whereby we focus on the behaviour of the prog...
Elvira Albert, Diego Alonso, Puri Arenas, Samir Ge...
ICEGOV
2009
ACM
15 years 11 months ago
Framework of e-governance at the local government level
With presumptions that e-government theories prevail in various formats and concepts around the globe, nations and institutions, not many examples are there to emulate in terms of...
Hakikur Rahman
JCDL
2009
ACM
127views Education» more  JCDL 2009»
15 years 11 months ago
Finding topic trends in digital libraries
We propose a generative model based on latent Dirichlet allocation for mining distinct topics in document collections by integrating the temporal ordering of documents into the ge...
Levent Bolelli, Seyda Ertekin, Ding Zhou, C. Lee G...
RECSYS
2009
ACM
15 years 11 months ago
TagiCoFi: tag informed collaborative filtering
Besides the rating information, an increasing number of modern recommender systems also allow the users to add personalized tags to the items. Such tagging information may provide...
Yi Zhen, Wu-Jun Li, Dit-Yan Yeung
CISS
2008
IEEE
15 years 11 months ago
Resource and power costs in dynamic spectrum allocation
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
Joydeep Acharya, Roy D. Yates