Sciweavers

3305 search results - page 647 / 661
» Models and Modeling Infrastructures for Global Computational...
Sort
View
MOBICOM
2006
ACM
14 years 1 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
SAC
2006
ACM
14 years 1 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
VISUALIZATION
2005
IEEE
14 years 1 months ago
Dataset Traversal with Motion-Controlled Transfer Functions
In this paper, we describe a methodology and implementation for interactive dataset traversal using motion-controlled transfer functions. Dataset traversal here refers to the proc...
Carlos D. Correa, Deborah Silver
DIGRA
2005
Springer
14 years 1 months ago
Fictive affinities in Final Fantasy XI: complicit and critical play in fantastic nations.
Like many massively-multiplayer role-playing games, Final Fantasy XI is a persistent world with a heroic fantasy setting. This paper discusses fictive player identities, and descr...
William Huber
JSSPP
2005
Springer
14 years 1 months ago
Wave Scheduler: Scheduling for Faster Turnaround Time in Peer-Based Desktop Grid Systems
The recent success of Internet-based computing projects, coupled with rapid developments in peer-to-peer systems, has stimulated interest in the notion of harvesting idle cycles u...
Dayi Zhou, Virginia Mary Lo