Sciweavers

1663 search results - page 293 / 333
» Computer Security in the Real World
Sort
View
233
Voted
GIS
2009
ACM
16 years 4 months ago
Spatio-Textual Spreadsheets: Geotagging via Spatial Coherence
The spatio-textual spreadsheet is a conventional spreadsheet where spatial attribute values are specified textually. Techniques are presented to automatically find the textually-s...
Hanan Samet, Jagan Sankaranarayanan, Jon Sperling,...
125
Voted
CHI
2004
ACM
16 years 4 months ago
Dual ecologies of robot as communication media: thoughts on coordinating orientations and projectability
The aim of our study is to investigate systems for supporting remote instruction via a mobile robot. In the real world, instructions are typically given through words and body ori...
Hideaki Kuzuoka, Keiichi Yamazaki, Akiko Yamazaki,...
138
Voted
EDBT
2008
ACM
169views Database» more  EDBT 2008»
16 years 3 months ago
Efficient online top-K retrieval with arbitrary similarity measures
The top-k retrieval problem requires finding k objects most similar to a given query object. Similarities between objects are most often computed as aggregated similarities of the...
Prasad M. Deshpande, Deepak P, Krishna Kummamuru
183
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
131
Voted
SC
2009
ACM
15 years 10 months ago
Scalable temporal order analysis for large scale debugging
We present a scalable temporal order analysis technique that supports debugging of large scale applications by classifying MPI tasks based on their logical program execution order...
Dong H. Ahn, Bronis R. de Supinski, Ignacio Laguna...