Sciweavers

2687 search results - page 464 / 538
» On the Conversion between Number Systems
Sort
View
CHI
2011
ACM
13 years 12 days ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
IWMM
2011
Springer
254views Hardware» more  IWMM 2011»
12 years 11 months ago
Short-term memory for self-collecting mutators
We propose a new memory model called short-term memory for managing objects on the heap. In contrast to the traditional persistent memory model for heap management, objects in sho...
Martin Aigner, Andreas Haas, Christoph M. Kirsch, ...
JSAC
2011
123views more  JSAC 2011»
12 years 11 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
11 years 11 months ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
MOBIHOC
2007
ACM
14 years 8 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao