Sciweavers

1644 search results - page 269 / 329
» Finding Dominators in Practice
Sort
View
TSP
2010
13 years 2 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
CHI
2011
ACM
12 years 11 months ago
Opportunities for computing technologies to support healthy sleep behaviors
Getting the right amount of quality sleep is a key aspect of good health, along with a healthy diet and regular exercise. Human-computer interaction (HCI) researchers have recentl...
Eun Kyoung Choe, Sunny Consolvo, Nathaniel F. Wats...
CHI
2011
ACM
12 years 11 months ago
Classroom-based assistive technology: collective use of interactive visual schedules by students with autism
vSked is an interactive and collaborative assistive technology for students with autism, combining visual schedules, choice boards, and a token-based reward system into an integra...
Meg Cramer, Sen H. Hirano, Monica Tentori, Michael...
CHI
2011
ACM
12 years 11 months ago
Donate for credibility: how contribution incentives can improve credibility
This study explores whether certain contribution incentives for online user-generated content can undermine or enhance contributor’s credibility. Through an online experiment, w...
Gary Hsieh, Scott E. Hudson, Robert E. Kraut
CSCW
2012
ACM
12 years 3 months ago
See friendship, sort of: how conversation and digital traces might support reflection on friendships
Inspired by conversational visualization tools and the increasing enactment of relationships in social media, we examine how people reflect on friendships and how social data and ...
Victoria Schwanda Sosik, Xuan Zhao, Dan Cosley