Sciweavers

15781 search results - page 2970 / 3157
» Evaluating Information Extraction
Sort
View
SASN
2004
ACM
15 years 9 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
SIGCOMM
2004
ACM
15 years 9 months ago
Vivaldi: a decentralized network coordinate system
Large-scale Internet applications can benefit from an ability to predict round-trip times to other hosts without having to contact them first. Explicit measurements are often un...
Frank Dabek, Russ Cox, M. Frans Kaashoek, Robert M...
AMAST
2004
Springer
15 years 9 months ago
A Science of Software Design
concerns, abstraction (particularly hierarchical abstraction), simplicity, and restricted visibility (locality of information). The overall goal behind these principles was stated ...
Don S. Batory
CIKM
2004
Springer
15 years 9 months ago
Event threading within news topics
With the overwhelming volume of online news available today, there is an increasing need for automatic techniques to analyze and present news to the user in a meaningful and effi...
Ramesh Nallapati, Ao Feng, Fuchun Peng, James Alla...
EDBTW
2004
Springer
15 years 9 months ago
P2PR-Tree: An R-Tree-Based Spatial Index for Peer-to-Peer Environments
Abstract. The unprecedented growth and increased importance of geographically distributed spatial data has created a strong need for efficient sharing of such data. Interestingly, ...
Anirban Mondal, Yi Lifu, Masaru Kitsuregawa
« Prev « First page 2970 / 3157 Last » Next »