Sciweavers

2100 search results - page 401 / 420
» Fundamentals of the problem
Sort
View
NSDI
2007
13 years 10 months ago
WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks
WiFi-based Long Distance (WiLD) networks with links as long as 50–100 km have the potential to provide connectivity at substantially lower costs than traditional approaches. How...
Rabin K. Patra, Sergiu Nedevschi, Sonesh Surana, A...
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
AISB
2008
Springer
13 years 9 months ago
Foundations of a Philosophy of Collective Intelligence
Philosophy, artificial intelligence and cognitive science have long been dominated by the presupposition that intelligence is fundamentally individual. Recent work in cognitive sci...
Harry Halpin
CANDC
2005
ACM
13 years 9 months ago
Freedom and constraint in the creative process in digital fine art: an AHRB invited workshop
The workshop will explore in depth the nature of freedom and constraint in the creative process in digital fine art from the perspective of embodied mind. The problem is crucial t...
John Haworth, Sue Gollifer, James Faure Walker, Pa...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 9 months ago
Inferring networks of diffusion and influence
Information diffusion and virus propagation are fundamental processes talking place in networks. While it is often possible to directly observe when nodes become infected, observi...
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Kra...