Sciweavers

1906 search results - page 360 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
ICSE
1995
IEEE-ACM
13 years 11 months ago
A Component- and Message-Based Architectural Style for GUI Software
-- While a large fraction of application code is devoted to graphical user interface (GUI) functions, support for reuse in this domain has largely been confined to the creation of...
Richard N. Taylor, Nenad Medvidovic, Kenneth M. An...
LREC
2010
163views Education» more  LREC 2010»
13 years 8 months ago
LIPS: A Tool for Predicting the Lexical Isolation Point of a Word
We present LIPS (Lexical Isolation Point Software), a tool for accurate lexical isolation point (IP) prediction in recordings of speech. The IP is the point in time in which a wor...
Andrew Thwaites, Jeroen Geertzen, William D. Marsl...
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
14 years 7 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
SIGECOM
2009
ACM
111views ECommerce» more  SIGECOM 2009»
14 years 1 months ago
A qualitative vickrey auction
Restricting the preferences of the agents by assuming that their utility functions linearly depend on a payment allows for the positive results of the Vickrey auction and the Vick...
Paul Harrenstein, Mathijs de Weerdt, Vincent Conit...