Sciweavers

515 search results - page 86 / 103
» A Strategy for Information Source Identification
Sort
View
JODL
2000
201views more  JODL 2000»
13 years 7 months ago
A transaction log analysis of a digital library
As experimental digital library testbeds gain wider acceptance and develop significant user bases, it becomes important to investigate the ways in which users interact with the sy...
Steve Jones, Sally Jo Cunningham, Rodger J. McNab,...
RAS
2007
119views more  RAS 2007»
13 years 6 months ago
Active estimation of distance in a robotic system that replicates human eye movement
In a moving agent, the different apparent motion of objects located at various distances provides an important source of depth information. While motion parallax is evident for la...
Fabrizio Santini, Michele Rucci
MOBICOM
2010
ACM
13 years 7 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
EDBT
2006
ACM
127views Database» more  EDBT 2006»
14 years 7 months ago
Progressive Query Optimization for Federated Queries
Federated queries are regular relational queries accessing data on one or more remote relational or non-relational data sources, possibly combining them with tables stored in the ...
Stephan Ewen, Holger Kache, Volker Markl, Vijaysha...
ICC
2009
IEEE
101views Communications» more  ICC 2009»
13 years 5 months ago
Using Limited Feedback in Power Allocation Design for a Two-Hop Relay OFDM System
In this paper, we study power allocation (PA) in a single-relay OFDM system with limited feedback. We propose a PA scheme that uses a codebook of quantized PA vectors designed offl...
Mahdi Hajiaghayi, Min Dong, Ben Liang