Sciweavers

2186 search results - page 424 / 438
» Model Transformation Technologies in the Context of Modellin...
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
Mining dependency relations for query expansion in passage retrieval
Classical query expansion techniques such as the local context analysis (LCA) make use of term co-occurrence statistics to incorporate additional contextual terms for enhancing pa...
Renxu Sun, Chai-Huat Ong, Tat-Seng Chua
ATAL
2005
Springer
14 years 1 months ago
Designing multiparty interaction support in Elva, an embodied tour guide
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...
Jun Zheng, Xiang Yuan, Yam San Chee
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
PRESENCE
2000
92views more  PRESENCE 2000»
13 years 7 months ago
Virtual Explorer: Interactive Virtual Environment for Education
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...
ASPLOS
2011
ACM
12 years 11 months ago
NV-Heaps: making persistent objects fast and safe with next-generation, non-volatile memories
nt, user-defined objects present an attractive abstraction for working with non-volatile program state. However, the slow speed of persistent storage (i.e., disk) has restricted ...
Joel Coburn, Adrian M. Caulfield, Ameen Akel, Laur...