نتایج جستجو برای: seeker
تعداد نتایج: 1046 فیلتر نتایج به سال:
We consider in this paper top-k query answering in social tagging systems, also known as folksonomies. This problem requires a significant departure from existing, socially agnostic techniques. In a network-aware context, one can (and should) exploit the social links, which can indicate how users relate to the seeker and how much weight their tagging actions should have in the result buildup. W...
PASCALYPTUS: A POWER-AWARE SCHEDULER FOR THE EUCALYPTUSFRAMEWORKbySOUMYASUDHARSAN SRINIVASARAGHAVANAugust 2012Advisor: Dr.Weisong ShiMajor:Computer ScienceDegree: Master of ScienceWith the advent of cloud computing, scalable resource utilization has become the ultimatereality. The energy consumption in a data center hosting cloud yields many serious i...
The use of the intensity change and line-of-sight (LOS) change concepts have previously been documented in the openliterature as techniques used by non-imaging infrared (IR) seekers to reject expendable IR countermeasures (IRCM). The purpose of this project was to implement IR counter-countermeasure (IRCCM) algorithms based on target intensity and kinematic behavior for a generic imaging IR (II...
The objective of an Optimal Power Flow (OPF) algorithm is to find steady state operation point which minimizes generation cost, loss etc. or maximizes social welfare, loadability etc. while maintaining an acceptable system performance in terms of limits on generators’ real and reactive powers, line flow limits, output of various compensating devices etc. This paper aims to find a solution for t...
BACKGROUND Because of immigration, female genital mutilation (FGM) is an issue of increasing concern in western countries. Nevertheless operators without a specific training may ignore the health condition of women subjected to this practice and fail to provide them adequate assistance. The purpose of the study was to estimate the current knowledge about FGM among social and health care assista...
We consider in this paper top-k query answering in social tagging (or bookmarking) applications. This problem requires a significant departure from existing, socially agnostic techniques. In a network-aware context, one can (and should) exploit the social links, which can indicate how users relate to the seeker and how much weight their tagging actions should have in the result build-up. We pro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید