Sciweavers

1016 search results - page 55 / 204
» Explore or Exploit
Sort
View
HT
2003
ACM
15 years 7 months ago
Collage, composites, construction
Tinderbox, a hypertext tool for making, analyzing, and sharing notes, explores the use of collage to build and share linked conceptual structures. Adopting a simple, regular data ...
Mark Bernstein
UIST
2003
ACM
15 years 7 months ago
VisionWand: interaction techniques for large displays using a passive wand tracked in 3D
A passive wand tracked in 3D using computer vision techniques is explored as a new input mechanism for interacting with large displays. We demonstrate a variety of interaction tec...
Xiang Cao, Ravin Balakrishnan
ECAI
2006
Springer
15 years 6 months ago
Benefits of Combinatorial Auctions with Transformability Relationships
In this paper we explore whether an auctioneer/buyer may benefit from introducing his transformability relationships (some goods can be transformed into others at a transformation ...
Andrea Giovannucci, Jesús Cerquides, Juan A...
ICFEM
2000
Springer
15 years 5 months ago
Formal Treatment of a Family of Fixed-Point Problems on Graphs by CafeOBJ
A family of well known problems on graphs includingthe shortest path problem and the data flow analysis problem can be uniformly formulated as a fixed-point problem on graphs. We ...
Tetsuo Tamai
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 2 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win