Sciweavers

1856 search results - page 269 / 372
» Phoning it in
Sort
View
EMSOFT
2004
Springer
14 years 2 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
GFKL
2004
Springer
132views Data Mining» more  GFKL 2004»
14 years 2 months ago
Reservation Price Estimation by Adaptive Conjoint Analysis
Abstract. Though reservation prices are needed for many business decision processes, e.g., pricing new products, it often turns out to be difficult to measure them. Many researcher...
Christoph Breidert, Michael Hahsler, Lars Schmidt-...
SELMAS
2004
Springer
14 years 2 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
SEM
2004
Springer
14 years 2 months ago
Supporting Generalized Context Interactions
Abstract. Context-awareness refers to a computing model where application behavior is driven by a continually-changing environment. Mobile computing poses unique challenges to cont...
Gregory Hackmann, Christine Julien, Jamie Payton, ...
TSD
2004
Springer
14 years 2 months ago
Acoustic and Linguistic Information Based Chinese Prosodic Boundary Labelling
The paper analyzes both acoustic and linguistic features with different Chinese prosodic boundaries. Then a rule-learning approach was used to do the prosodic boundary labelling. ...
Jianhua Tao