Sciweavers

1055 search results - page 164 / 211
» Enumerations in computable structure theory
Sort
View
ISEM
2008
129views more  ISEM 2008»
13 years 7 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
TKDE
2008
134views more  TKDE 2008»
13 years 7 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
TCIAIG
2010
13 years 2 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
CSCW
2011
ACM
12 years 11 months ago
Understanding technology choices and values through social class
This ethnographic study of 22 diverse families in the San Francisco Bay Area explores parents’ attitudes about their children’s use of technology. We found that parents from d...
Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spa...
PODC
2009
ACM
14 years 8 months ago
Brief announcement: minimum spanning trees and cone-based topology control
Consider a setting where nodes can vary their transmission power thereby changing the network topology, the goal of topology control is to reduce the transmission power while ensu...
Alejandro Cornejo, Nancy A. Lynch