Sciweavers

4612 search results - page 843 / 923
» More Communications
Sort
View
MOBISYS
2009
ACM
14 years 9 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
KDD
2005
ACM
170views Data Mining» more  KDD 2005»
14 years 9 months ago
Parallel mining of closed sequential patterns
Discovery of sequential patterns is an essential data mining task with broad applications. Among several variations of sequential patterns, closed sequential pattern is the most u...
Shengnan Cong, Jiawei Han, David A. Padua
CHI
2006
ACM
14 years 9 months ago
Providing support for adaptive scripting in an on-line collaborative learning environment
This paper describes results from a series of experimental studies to explore issues related to structuring productive group dynamics for collaborative learning using an adaptive ...
Carolyn Penstein Rosé, Gahgene Gweon, Regan...
CHI
2006
ACM
14 years 9 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
14 years 9 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford