Sciweavers

1016 search results - page 55 / 204
» Explore or Exploit
Sort
View
HT
2003
ACM
14 years 2 months ago
Collage, composites, construction
Tinderbox, a hypertext tool for making, analyzing, and sharing notes, explores the use of collage to build and share linked conceptual structures. Adopting a simple, regular data ...
Mark Bernstein
UIST
2003
ACM
14 years 2 months ago
VisionWand: interaction techniques for large displays using a passive wand tracked in 3D
A passive wand tracked in 3D using computer vision techniques is explored as a new input mechanism for interacting with large displays. We demonstrate a variety of interaction tec...
Xiang Cao, Ravin Balakrishnan
ECAI
2006
Springer
14 years 22 days ago
Benefits of Combinatorial Auctions with Transformability Relationships
In this paper we explore whether an auctioneer/buyer may benefit from introducing his transformability relationships (some goods can be transformed into others at a transformation ...
Andrea Giovannucci, Jesús Cerquides, Juan A...
ICFEM
2000
Springer
14 years 20 days ago
Formal Treatment of a Family of Fixed-Point Problems on Graphs by CafeOBJ
A family of well known problems on graphs includingthe shortest path problem and the data flow analysis problem can be uniformly formulated as a fixed-point problem on graphs. We ...
Tetsuo Tamai
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 9 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win