Sciweavers

1033 search results - page 150 / 207
» Properties of Exercise Strategies
Sort
View
INFOSCALE
2006
ACM
15 years 10 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
MOBIWAC
2006
ACM
15 years 10 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
102
Voted
UIST
2006
ACM
15 years 10 months ago
Under the table interaction
We explore the design space of a two-sided interactive touch table, designed to receive touch input from both the top and bottom surfaces of the table. By combining two registered...
Daniel Wigdor, Darren Leigh, Clifton Forlines, Sam...
CVPR
2010
IEEE
15 years 9 months ago
YouTubeCat: Learning to Categorize Wild Web Videos
Automatic categorization of videos in a Web-scale unconstrained collection such as YouTube is a challenging task. A key issue is how to build an effective training set in the pres...
Zheshen Wang, Ming Zhao, Yang Song, Sanjiv Kumar, ...
AICCSA
2005
IEEE
124views Hardware» more  AICCSA 2005»
15 years 9 months ago
On multicast scheduling and routing in multistage Clos networks
Multicast communication, which involves transmitting information from one node to multiple nodes, is a vital operation in both broadband integrated services digital networks (BISD...
Bin Tang