Sciweavers

2913 search results - page 423 / 583
» How Much to Copy
Sort
View
WSC
2007
13 years 11 months ago
Towards a framework for healthcare simulation
The changing needs of healthcare provision around the world are forcing service designers and decision makers to adopt new tools in design and evaluation of processes. Apart from ...
Tillal Eldabi, Terry Young
ACMACE
2008
ACM
13 years 11 months ago
Motion controlled mobile 3D multiplayer gaming
Due to limitations in the user interface one of the oft cited most desirable features for mobile games is that they can be played using a single button. However, games using this ...
Fadi Chehimi, Paul Coulton
ACSAC
2008
IEEE
13 years 11 months ago
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage
Much effort has been expended in recent years to create large sets of hash codes from known files. Distributing these sets has become more difficult as these sets grow larger. Mea...
Paul F. Farrell Jr., Simson L. Garfinkel, Douglas ...
ANTSW
2008
Springer
13 years 11 months ago
Beanbag Robotics: Robotic Swarms with 1-DoF Units
Robotic swarm behavior is usually demonstrated using groups of robots, in which each robot in the swarm must possess full mobile capabilities, including the ability to control both...
David M. M. Kriesel, Eugene Cheung, Metin Sitti, H...
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
13 years 11 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan