Sciweavers

1016 search results - page 36 / 204
» Explore or Exploit
Sort
View
DSRT
2005
IEEE
14 years 2 months ago
Exploring the Use of Local Consistency Measures as Thresholds for Dead Reckoning Update Packet Generation
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as lat...
David J. Roberts, Damien Marshall, Rob Aspin, S&ea...
MM
2005
ACM
112views Multimedia» more  MM 2005»
14 years 2 months ago
MediaMill: exploring news video archives based on learned semantics
In this technical demonstration we showcase the MediaMill system. A search engine that facilitates access to news video archives at a semantic level. The core of the system is an ...
Cees Snoek, Marcel Worring, Jan van Gemert, Jan-Ma...
IWMM
2004
Springer
101views Hardware» more  IWMM 2004»
14 years 2 months ago
Exploring the barrier to entry: incremental generational garbage collection for Haskell
We document the design and implementation of a “production” incremental garbage collector for GHC 6.2. It builds on our earlier work (Non-stop Haskell) that exploited GHC’s ...
Andrew M. Cheadle, A. J. Field, Simon Marlow, Simo...
DAGSTUHL
2010
13 years 10 months ago
Exploring Visualization Methods for Complex Variables
Applications of complex variables and related manifolds appear throughout mathematics and science. Here we review a family of basic methods for applying visualization concepts to ...
Andrew J. Hanson, Ji-Ping Sha
NSDI
2010
13 years 10 months ago
Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks
Existing flooding algorithms have demonstrated their effectiveness in achieving communication efficiency and reliability in wireless sensor networks. However, further performance ...
Ting Zhu, Ziguo Zhong, Tian He, Zhi-Li Zhang