Sciweavers

4207 search results - page 782 / 842
» Stable Analysis Patterns
Sort
View
JAPLL
2010
98views more  JAPLL 2010»
13 years 6 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton
JASIS
2010
141views more  JASIS 2010»
13 years 6 months ago
Member activities and quality of tags in a collection of historical photographs in Flickr
There is growing interest in, and an increasing number of attempts by, traditional information providers to engage social content creation and sharing communities in creating and ...
Besiki Stvilia, Corinne Jörgensen
SUM
2010
Springer
13 years 6 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
WIOPT
2010
IEEE
13 years 6 months ago
Performance tuning of Infrastructure-Mode wireless LANs
—Conventional wisdom about 802.11 WLANs dictates that as the number of active users increases, the contention windows (CW) of all the contending users needs to increase to preven...
Yigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han, Th...
SECON
2010
IEEE
13 years 6 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang