Sciweavers

1625 search results - page 183 / 325
» Intentionality
Sort
View
WCRE
2009
IEEE
14 years 5 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
WIMOB
2009
IEEE
14 years 5 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
SASO
2009
IEEE
14 years 5 months ago
Patterns of Delegate MAS
Delegate MAS has been proposed and investigated as an integrated coordination technique for so-called self-organising coordination-and-control applications. Delegate MAS consist o...
Tom Holvoet, Danny Weyns, Paul Valckenaers
ICDM
2009
IEEE
98views Data Mining» more  ICDM 2009»
14 years 5 months ago
Topic Distributions over Links on Web
—It is well known that Web users create links with different intentions. However, a key question, which is not well studied, is how to categorize the links and how to quantify th...
Jie Tang, Jing Zhang, Jeffrey Xu Yu, Zi Yang, Keke...
INFOCOM
2009
IEEE
14 years 5 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano