Sciweavers

5718 search results - page 1068 / 1144
» Modeling Rule Precision
Sort
View
DL
2000
Springer
137views Digital Library» more  DL 2000»
15 years 6 months ago
Server selection on the World Wide Web
We evaluate server selection methods in a Web environment, modeling a digital library which makes use of existing Web search servers rather than building its own index. The evalua...
Nick Craswell, Peter Bailey, David Hawking
FCT
1997
Springer
15 years 6 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis
152
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 6 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ECCV
2006
Springer
15 years 6 months ago
Accurate Measurement of Cartilage Morphology Using a 3D Laser Scanner
We describe a method to accurately assess articular cartilage morphology using the three-dimensional laser scanning technology. Traditional methods to obtain ground truth for valid...
Nhon H. Trinh, Jonathan Lester, Braden C. Fleming,...
135
Voted
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
15 years 4 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...
« Prev « First page 1068 / 1144 Last » Next »