Sciweavers

7929 search results - page 1563 / 1586
» Applications experience in Jade
Sort
View
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
13 years 5 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
NAACL
2010
13 years 5 months ago
Dialogue-Oriented Review Summary Generation for Spoken Dialogue Recommendation Systems
In this paper we present an opinion summarization technique in spoken dialogue systems. Opinion mining has been well studied for years, but very few have considered its applicatio...
Jingjing Liu, Stephanie Seneff, Victor Zue
SECON
2010
IEEE
13 years 5 months ago
Prototyping Energy Harvesting Active Networked Tags (EnHANTs) with MICA2 Motes
Abstract--With the convergence of ultra-low-power communications and energy-harvesting technologies, networking selfsustainable ubiquitous devices is becoming feasible. Hence, we h...
Maria Gorlatova, T. Sharma, D. Shrestha, E. Xu, Ji...
SIGSOFT
2010
ACM
13 years 5 months ago
Growth of newcomer competence: challenges of globalization
The transfer of entire projects to offshore locations, the aging and renewal of core developers in legacy products, the recruiting in fast growing Internet companies, and the part...
Minghui Zhou, Audris Mockus
SOCIALCOM
2010
13 years 5 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
« Prev « First page 1563 / 1586 Last » Next »