Sciweavers

2006 search results - page 344 / 402
» Heuristic Security-Testing Methods
Sort
View
TKDE
2008
191views more  TKDE 2008»
13 years 9 months ago
Beyond Single-Page Web Search Results
Given a user keyword query, current Web search engines return a list of individual Web pages ranked by their "goodness" with respect to the query. Thus, the basic unit fo...
Ramakrishna Varadarajan, Vagelis Hristidis, Tao Li
JIIS
2007
133views more  JIIS 2007»
13 years 9 months ago
SPHINX: Schema integration by example
The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repositories ...
François Barbançon, Daniel P. Mirank...
TSP
2008
143views more  TSP 2008»
13 years 9 months ago
Sparse Representation in Structured Dictionaries With Application to Synthetic Aperture Radar
Sparse signal representations and approximations from overcomplete dictionaries have become an invaluable tool recently. In this paper, we develop a new, heuristic, graph-structure...
Kush R. Varshney, Müjdat Çetin, John W...
TSP
2008
101views more  TSP 2008»
13 years 9 months ago
ARQ by Subcarrier Assignment for OFDM-Based Systems
We consider two automatic repeat request (ARQ) schemes based on subcarrier assignment in orthogonal frequency-division multiplexing (OFDM)-based systems: single ARQ subcarrier assi...
Chin Keong Ho, Hongming Yang, Ashish Pandharipande...
ANOR
2004
79views more  ANOR 2004»
13 years 9 months ago
Preference-Based Search and Multi-Criteria Optimization
Many real-world AI problems (e.g. in configuration) are weakly constrained, thus requiring a mechanism for characterizing and finding the preferred solutions. Preferencebased sear...
Ulrich Junker