Sciweavers

34202 search results - page 6726 / 6841
» The Tera computer system
Sort
View
ISI
2005
Springer
14 years 2 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
LOPSTR
2005
Springer
14 years 2 months ago
Non-leftmost Unfolding in Partial Evaluation of Logic Programs with Impure Predicates
Partial evaluation of logic programs which contain impure predicates poses non-trivial challenges. Impure predicates include those which produce side-effects, raise errors (or exc...
Elvira Albert, Germán Puebla, John P. Galla...
LOPSTR
2005
Springer
14 years 2 months ago
Declarative Programming with Function Patterns
We propose an extension of functional logic languages that allows the definition of operations with patterns containing other defined operation symbols. Such “function patterns...
Sergio Antoy, Michael Hanus
MIDDLEWARE
2005
Springer
14 years 2 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
POLICY
2005
Springer
14 years 2 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
« Prev « First page 6726 / 6841 Last » Next »