Sciweavers

3844 search results - page 626 / 769
» Distributed Meeting Scheduling
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Power law discounting for n-gram language models
We present an approximation to the Bayesian hierarchical PitmanYor process language model which maintains the power law distribution over word tokens, while not requiring a comput...
Songfang Huang, Steve Renals
APIN
2008
108views more  APIN 2008»
13 years 10 months ago
Achieving self-healing in service delivery software systems by means of case-based reasoning
Abstract Self-healing, i.e. the capability of a system to autonomously detect failures and recover from them, is a very attractive property that may enable large-scale software sys...
Stefania Montani, Cosimo Anglano
CN
2008
126views more  CN 2008»
13 years 10 months ago
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Qi Wang, Robert Atkinson, John Dunlop
DEBU
2010
108views more  DEBU 2010»
13 years 10 months ago
Real-Time Traffic Information Management using Stream Computing
With the widespread adoption of location tracking technologies like GPS, the domain of transportation information management has seen growing interest in the last few years. In th...
Alain Biem, Eric Bouillet, Hanhua Feng, Anand Rang...
ENTCS
2008
130views more  ENTCS 2008»
13 years 10 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...