Sciweavers

7526 search results - page 1387 / 1506
» The Design and Implementation of the A2QM3 System
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
A hierarchical model for BGP routing policies
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, ...
Laurent Vanbever, Bruno Quoitin, Olivier Bonaventu...
SIGIR
2009
ACM
14 years 3 months ago
Automatic URL completion and prediction using fuzzy type-ahead search
Type-ahead search is a new information-access paradigm, in which systems can find answers to keyword queries “onthe-fly” as a user types in a query. It improves traditional ...
Jiannan Wang, Guoliang Li, Jianhua Feng
UIST
2009
ACM
14 years 3 months ago
Mining web interactions to automatically create mash-ups
The deep web contains an order of magnitude more information than the surface web, but that information is hidden behind the web forms of a large number of web sites. Metasearch e...
Jeffrey P. Bigham, Ryan S. Kaminsky, Jeffrey Nicho...
VRML
2009
ACM
14 years 3 months ago
Interactive stories on the net: a model and an architecture for X3D worlds
This work discusses a model and an architecture for interactive stories to be displayed on the net, designed for being independent from the specific story represented and suitabl...
Efrem Carnielli, Fabio Pittarello
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
« Prev « First page 1387 / 1506 Last » Next »