Sciweavers

7112 search results - page 1182 / 1423
» Power in normative systems
Sort
View
MSWIM
2006
ACM
14 years 3 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
SAC
2006
ACM
14 years 3 months ago
Relevance feedback methods for logo and trademark image retrieval on the web
Relevance feedback is the state-of-the-art approach for adjusting query results to the needs of the users. This work extends the existing framework of image retrieval with relevan...
Euripides G. M. Petrakis, Klaydios Kontis, Epimeni...
SIGSOFT
2006
ACM
14 years 3 months ago
Interpolation for data structures
Interpolation based automatic abstraction is a powerful and robust technique for the automated analysis of hardware and software systems. Its use has however been limited to contr...
Deepak Kapur, Rupak Majumdar, Calogero G. Zarba
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Selective Channel Feedback Mechanisms for Wireless Multichannel Scheduling
Opportunistic scheduling can significantly improve wireless network performance by exploiting the feedback information that conveys the underlying channel condition. In emerging ...
Young-June Choi, Saewoong Bahk
ACSAC
2005
IEEE
14 years 3 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
« Prev « First page 1182 / 1423 Last » Next »