Sciweavers

14386 search results - page 2850 / 2878
» Algorithms for user interfaces
Sort
View
ASSETS
2005
ACM
13 years 9 months ago
Verification of computer display pre-compensation for visual aberrations in an artificial eye
The possibility of pre-compensating images in a computer display according to the visual aberrations previously assessed in an optical system (e.g., the computer user’s eye) has...
Miguel Alonso Jr., Armando Barreto, Julie A. Jacko...
CONEXT
2005
ACM
13 years 9 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
CONEXT
2005
ACM
13 years 9 months ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida
LCTRTS
2010
Springer
13 years 9 months ago
An efficient code update scheme for DSP applications in mobile embedded systems
DSP processors usually provide dedicated address generation units (AGUs) to assist address computation. By carefully allocating variables in the memory, DSP compilers take advanta...
Weijia Li, Youtao Zhang
IMC
2007
ACM
13 years 9 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
« Prev « First page 2850 / 2878 Last » Next »