Sciweavers

14809 search results - page 2956 / 2962
» Model transformation by demonstration
Sort
View
HT
2011
ACM
12 years 11 months ago
Bridging link and query intent to enhance web search
Understanding query intent is essential to generating appropriate rankings for users. Existing methods have provided customized rankings to answer queries with different intent. W...
Na Dai, Xiaoguang Qi, Brian D. Davison
INFOCOM
2011
IEEE
12 years 11 months ago
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks
Abstract—We propose a routing metric for enabling highthroughput reliable multicast in multi-rate wireless mesh networks. This new multicast routing metric, called expected multi...
Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, S...
MBEC
2011
157views more  MBEC 2011»
12 years 10 months ago
Size matters: MEG empirical and simulation study on source localization of the earliest visual activity in the occipital cortex
Abstract While the relationship between sensory stimulation and tasks and the size of the cortical activations is generally unknown, the visual modality offers a unique possibility...
Sanja Josef Golubic, Ana Susac, Veljko Grilj, Doug...
POPL
2011
ACM
12 years 10 months ago
Pick your contexts well: understanding object-sensitivity
ensitivity has emerged as an excellent context abstraction for points-to analysis in object-oriented languages. Despite its practical success, however, object-sensitivity is poorl...
Yannis Smaragdakis, Martin Bravenboer, Ondrej Lhot...
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
« Prev « First page 2956 / 2962 Last » Next »