Sciweavers

610 search results - page 14 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
IPPS
2003
IEEE
14 years 1 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...
AMOST
2007
ACM
14 years 16 days ago
Using LTL rewriting to improve the performance of model-checker based test-case generation
Model-checkers have recently been suggested for automated software test-case generation. Several works have presented methods that create efficient test-suites using model-checker...
Gordon Fraser, Franz Wotawa
WIMOB
2008
IEEE
14 years 2 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
MHCI
2005
Springer
14 years 2 months ago
Survey of position location techniques in mobile systems
The growth of mobile technology has made recording of user’s location possible. The systems that intent to use location in order to register user’s movement and to use the gen...
Thanos Manesis, Nikolaos M. Avouris

Book
640views
15 years 7 months ago
Introduction to Pattern Recognition
"Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typical...
Sargur Srihari