Sciweavers

1548 search results - page 159 / 310
» Computational Approaches to Sentence Completion
Sort
View
TRIDENTCOM
2008
IEEE
14 years 3 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
DASFAA
2007
IEEE
208views Database» more  DASFAA 2007»
14 years 3 months ago
Probabilistic Nearest-Neighbor Query on Uncertain Objects
Nearest-neighbor queries are an important query type for commonly used feature databases. In many different application areas, e.g. sensor databases, location based services or fac...
Hans-Peter Kriegel, Peter Kunath, Matthias Renz
IPPS
2007
IEEE
14 years 3 months ago
OS Mechanism for Continuation-based Fine-grained Threads on Dedicated and Commodity Processors
Fine-grained multithreading based on a natural model, such as dataflow model, is promising in achieving high efficiency and high programming productivity. In this paper, we disc...
Shigeru Kusakabe, Satoshi Yamada, Mitsuhiro Aono, ...
ICRA
2006
IEEE
148views Robotics» more  ICRA 2006»
14 years 3 months ago
AutoPower: Toward Energy-aware Software Systems for Distributed Mobile Robots
— Autonomous robot systems have to manage their energy wisely in order to complete their missions. Typical approaches seek to conserve energy by energy-efficient motion or senso...
Keith J. O'Hara, Ripal Nathuji, Himanshu Raj, Kars...
IPTPS
2005
Springer
14 years 2 months ago
Peering Peer-to-Peer Providers
The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distribute...
Hari Balakrishnan, Scott Shenker, Michael Walfish