Sciweavers

25189 search results - page 8 / 5038
» Information Systems Frontiers
Sort
View
ICPP
2006
IEEE
14 years 3 months ago
A Parallel External-Memory Frontier Breadth-First Traversal Algorithm for Clusters of Workstations
— This paper presents a parallel external-memory algorithm for performing a breadth-first traversal of an implicit graph on a cluster of workstations. The algorithm is a paralle...
Robert Niewiadomski, José Nelson Amaral, Ro...
COMCOM
2004
118views more  COMCOM 2004»
13 years 9 months ago
The next frontier for communications networks: power management
Storage, memory, processor, and communications bandwidth are all relatively plentiful and inexpensive. However, a growing expense in the operation of computer networks is electric...
Kenneth J. Christensen, Chamara Gunaratne, Bruce N...
JCDL
2011
ACM
191views Education» more  JCDL 2011»
13 years 21 days ago
Serendipitous recommendation for scholarly papers considering relations among researchers
Serendipity occurs when one finds an interesting discovery while searching for something else. In digital libraries, recommendation engines are particularly well-suited for seren...
Kazunari Sugiyama, Min-Yen Kan
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
14 years 4 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
IH
2005
Springer
14 years 3 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...