Sciweavers

966 search results - page 185 / 194
» Accuracy measures for evaluating computer pointing devices
Sort
View
SIGMETRICS
2011
ACM
229views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Model-driven optimization of opportunistic routing
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve ...
Eric Rozner, Mi Kyung Han, Lili Qiu, Yin Zhang
MOBICOM
2006
ACM
14 years 1 months ago
IQU: practical queue-based user association management for WLANs
Flash crowds and high concentrations of users in wireless LANs (WLANs) cause significant interference problems and unsustainable load at access points. This leads to poor connect...
Amit P. Jardosh, Kimaya Mittal, Krishna N. Ramacha...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 1 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
CVPR
2012
IEEE
11 years 10 months ago
Recovering free space of indoor scenes from a single image
In this paper we consider the problem of recovering the free space of an indoor scene from its single image. We show that exploiting the box like geometric structure of furniture ...
Varsha Hedau, Derek Hoiem, David A. Forsyth
CONEXT
2009
ACM
13 years 8 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...