Sciweavers

26354 search results - page 147 / 5271
» How we refactor, and how we know it
Sort
View
CCS
2011
ACM
12 years 10 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
GLOBECOM
2009
IEEE
14 years 5 months ago
How Does Correlation Affect the Capacity of MIMO Systems with Rate Constraints?
—In this paper, we study the impact of antenna correlation at mobile units (MUs) on the capacity of multi-user multiple-input multiple-output (MIMO) systems with rate constraints...
Hao Wang, Peng Wang, Li Ping, Xiaokang Lin
COMPGEOM
2006
ACM
14 years 4 months ago
How slow is the k-means method?
The k-means method is an old but popular clustering algorithm known for its observed speed and its simplicity. Until recently, however, no meaningful theoretical bounds were known...
David Arthur, Sergei Vassilvitskii
IVA
2005
Springer
14 years 3 months ago
Teaching Virtual Characters How to Use Body Language
Abstract. Non-verbal communication, or “body language”, is a critical component in constructing believable virtual characters. Most often, body language is implemented by a set...
Doron A. Friedman, Marco Gillies
TSD
2004
Springer
14 years 3 months ago
How Dominant Is the Commonest Sense of a Word?
We present a mathematical model of word sense frequency distributions, and use word distributions to set parameters. The model implies that the expected dominance of the commonest ...
Adam Kilgarriff