Sciweavers

2788 search results - page 537 / 558
» Use of Data Recharging for Personal Information Environment
Sort
View
JCDL
2003
ACM
105views Education» more  JCDL 2003»
14 years 23 days ago
Convergence of Knowledge Management and E-Learning: The GetSmart Experience
The National Science Digital Library (NSDL), launched in December 2002, is emerging as a center of innovation in digital libraries as applied to education. As a part of this exten...
Byron Marshall, Yiwen Zhang, Hsinchun Chen, Ann M....
MOBICOM
1998
ACM
13 years 11 months ago
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
SIGSOFT
1994
ACM
13 years 11 months ago
Speeding up Slicing
Program slicing is a fundamental operation for many software engineering tools. Currently, the most efficient algorithm for interprocedural slicing is one that uses a program repr...
Thomas W. Reps, Susan Horwitz, Shmuel Sagiv, Genev...
ACSW
2007
13 years 9 months ago
An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. T...
Jon Patrick, Yefeng Wang, Peter Budd
CN
2007
80views more  CN 2007»
13 years 7 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly