Sciweavers

1265 search results - page 32 / 253
» Finding the Key to a Synapse
Sort
View
AMC
2005
127views more  AMC 2005»
13 years 8 months ago
The identification of nondominated and efficient paths on a network
In this paper, we present an application of 0-1 linear programming problem in the indentification of the nondominated paths on a network. To find efficient paths, an adaptationof t...
Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N...
IEAAIE
2007
Springer
14 years 3 months ago
Episodic Memory for Ubiquitous Multimedia Contents Management System
Recently, mobile devices are regarded as a content storage with their functions such as camera, camcorder, and music player. It creates massive new data and downloads contents from...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
IPCCC
2006
IEEE
14 years 2 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
UM
2010
Springer
14 years 2 months ago
Modeling Long-Term Search Engine Usage
Search engines are key components in the online world and the choice of search engine is an important determinant of the user experience. In this work we seek to model user behavio...
Ryen W. White, Ashish Kapoor, Susan T. Dumais
ICDAR
1999
IEEE
14 years 1 months ago
Context Filters for Document-based Information Filtering
In this paper we propose a keyPhrase-sense disambiguation methodology called "context filters" for use in keyPhrase based information filtering systems. A context filter...
K. R. K. Murthy, S. Sathiya Keerthi