Sciweavers

1170 search results - page 154 / 234
» Retrieval effectiveness of an ontology-based model for infor...
Sort
View
LCN
2007
IEEE
14 years 2 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
TIP
2008
139views more  TIP 2008»
13 years 7 months ago
Model-Based 2.5-D Deconvolution for Extended Depth of Field in Brightfield Microscopy
Abstract--Due to the limited depth of field of brightfield microscopes, it is usually impossible to image thick specimens entirely in focus. By optically sectioning the specimen, t...
François Aguet, Dimitri Van De Ville, Micha...
CIKM
2009
Springer
14 years 2 months ago
Vetting the links of the web
Many web links mislead human surfers and automated crawlers because they point to changed content, out-of-date information, or invalid URLs. It is a particular problem for large, ...
Na Dai, Brian D. Davison
KDD
1999
ACM
237views Data Mining» more  KDD 1999»
14 years 3 days ago
Using Association Rules for Product Assortment Decisions: A Case Study
It has been claimed that the discovery of association rules is well-suited for applications of market basket analysis to reveal regularities in the purchase behaviour of customers...
Tom Brijs, Gilbert Swinnen, Koen Vanhoof, Geert We...
IH
2005
Springer
14 years 1 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang