Sciweavers

16844 search results - page 3336 / 3369
» How to Design Programs
Sort
View
JTAER
2006
100views more  JTAER 2006»
13 years 10 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
NLE
2008
118views more  NLE 2008»
13 years 10 months ago
Part-of-speech tagging of Modern Hebrew text
Words in Semitic texts often consist of a concatenation of word segments, each corresponding to a Part-of-Speech (POS) category. Semitic words may be ambiguous with regard to thei...
Roy Bar-Haim, Khalil Sima'an, Yoad Winter
NECO
2006
111views more  NECO 2006»
13 years 10 months ago
Dynamics and Topographic Organization of Recursive Self-Organizing Maps
Recently, there has been an outburst of interest in extending topographic maps of vectorial data to more general data structures, such as sequences or trees. However, at present, ...
Peter Tiño, Igor Farkas, Jort van Mourik
NETWORK
2006
218views more  NETWORK 2006»
13 years 10 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
SIGMETRICS
2008
ACM
13 years 10 months ago
Scheduling despite inexact job-size information
Motivated by the optimality of Shortest Remaining Processing Time (SRPT) for mean response time, in recent years many computer systems have used the heuristic of "favoring sm...
Adam Wierman, Misja Nuyens
« Prev « First page 3336 / 3369 Last » Next »