Sciweavers

1456 search results - page 269 / 292
» Keeping encountered information
Sort
View
DASFAA
2008
IEEE
106views Database» more  DASFAA 2008»
14 years 5 months ago
Flood Little, Cache More: Effective Result-Reuse in P2P IR Systems
State-of-the-art Peer-to-Peer Information Retrieval (P2P IR) systems suffer from their lack of response time guarantee especially with scale. To address this issue, a number of tec...
Christian Zimmer, Srikanta J. Bedathur, Gerhard We...
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
14 years 5 months ago
Self-Similarity Metric for Index Pruning in Conceptual Vector Space Models
— One of the critical issues in search engines is the size of search indexes: as the number of documents handled by an engine increases, the search must preserve its efficiency,...
Dario Bonino, Fulvio Corno
ICC
2008
IEEE
197views Communications» more  ICC 2008»
14 years 5 months ago
V-BLAST Receiver and Performance In MIMO Relay Networks with Imperfect CSI
Abstract —Previous work demonstrated that the improvements in spectral efficiency and link reliability can be obtained in wireless relay networks employing terminals with MIMO c...
Jiansong Chen, Xiaoli Yu, C. C. Jay Kuo
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
14 years 5 months ago
GVT: a platform to create virtual environments for procedural training
The use of Virtual Environments for Training is strongly stimulated by important needs for training on sensitive equipments. Yet, developing such an application is often done with...
Stéphanie Gerbaud, Nicolas Mollet, Franck G...
WIMOB
2008
IEEE
14 years 5 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...