Sciweavers

2006 search results - page 342 / 402
» Heuristic Security-Testing Methods
Sort
View
IR
2006
13 years 9 months ago
Table extraction for answer retrieval
The ability to find tables and extract information from them is a necessary component of many information retrieval tasks. Documents often contain tables in order to communicate d...
Xing Wei, W. Bruce Croft, Andrew McCallum
JCO
2006
126views more  JCO 2006»
13 years 9 months ago
Minimum power assignment in wireless ad hoc networks with spanner property
Power assignment for wireless ad hoc networks is to assign a power for each wireless node such that the induced communication graph has some required properties. Recently research ...
Yu Wang 0003, Xiang-Yang Li
JUCS
2008
148views more  JUCS 2008»
13 years 9 months ago
SHARP Online: An Adaptive Hypermedia System Applied to Mathematical Problem Solving
: In this article we present the development of a web application called SHARP Online: An Adaptive Hypermedia System Applied to Mathematical Problem Solving. The pedagogical basis ...
Ana Belén Gil, Raquel Rodríguez, Fra...
MAGS
2008
191views more  MAGS 2008»
13 years 9 months ago
Consensus ontologies in socially interacting MultiAgent systems
This paper presents approaches for building, managing, and evaluating consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent h...
Ergun Biçici
JPDC
2006
100views more  JPDC 2006»
13 years 9 months ago
An integrated admission control scheme for the delivery of streaming media
Quality of service (QoS) assurance is a major concern in media-on-demand (MoD) systems. Admission control is one of the most important issues that need to be addressed for QoS ass...
Zhonghang Xia, I-Ling Yen, Donglei Du, Peng Li