Sciweavers

4444 search results - page 783 / 889
» Modelling Dynamic Web Data
Sort
View
CN
2007
80views more  CN 2007»
13 years 10 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
JSW
2008
113views more  JSW 2008»
13 years 10 months ago
Semantic Information Retrieval Based on Fuzzy Ontology for Electronic Commerce
Information retrieval is the important work for Electronic Commerce. Ontology-based semantic retrieval is a hotspot of current research. In order to achieve fuzzy semantic retrieva...
Jun Zhai, Yiduo Liang, Yi Yu, Jiatao Jiang
ENTCS
2002
145views more  ENTCS 2002»
13 years 10 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
ECIR
2010
Springer
13 years 8 months ago
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval
Personal lifelog archives contain digital records captured from an individual’s daily life, e.g. emails, web pages downloaded and SMSs sent or received. While capturing this info...
Liadh Kelly, Gareth J. F. Jones
IJCV
2010
168views more  IJCV 2010»
13 years 8 months ago
Baselines for Image Annotation
Automatically assigning keywords to images is of great interest as it allows one to retrieve, index, organize and understand large collections of image data. Many techniques have b...
Ameesh Makadia, Vladimir Pavlovic, Sanjiv Kumar