Sciweavers

4138 search results - page 810 / 828
» Design and implementation of a network simulation system
Sort
View
162
Voted
ATAL
2010
Springer
15 years 4 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
CORR
2006
Springer
112views Education» more  CORR 2006»
15 years 3 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
117
Voted
IUI
2004
ACM
15 years 9 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
119
Voted
SI3D
1997
ACM
15 years 7 months ago
Post-rendering 3D warping
A pair of rendered images and their Z-buffers contain almost all of the information necessary to re-render from nearby viewpoints. For the small changes in viewpoint that occur in...
William R. Mark, Leonard McMillan, Gary Bishop
138
Voted
EDBT
2010
ACM
145views Database» more  EDBT 2010»
15 years 6 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre