Sciweavers

3937 search results - page 598 / 788
» Questioning Ubiquitous Computing
Sort
View
PERVASIVE
2004
Springer
15 years 7 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
116
Voted
PPSN
2004
Springer
15 years 7 months ago
Experimental Supplements to the Theoretical Analysis of EAs on Problems from Combinatorial Optimization
It is typical for the EA community that theory follows experiments. Most theoretical approaches use some model of the considered evolutionary algorithm (EA) but there is also some ...
Patrick Briest, Dimo Brockhoff, Bastian Degener, M...
CVPR
2010
IEEE
15 years 7 months ago
Learning Appearance in Virtual Scenarios for Pedestrian Detection
Detecting pedestrians in images is a key functionality to avoid vehicle-to-pedestrian collisions. The most promising detectors rely on appearance-based pedestrian classifiers tra...
Francisco Marin Tur, David Vazquez, David Geronimo...
107
Voted
CHI
2010
ACM
15 years 7 months ago
Managing nomadic knowledge: a case study of the European social forum
In this paper we portray a specific type of knowledge which we term ‘nomadic knowledge’. It is required periodically by different actors and travels along foreseeable paths be...
Saqib Saeed, Volkmar Pipek, Markus Rohde, Volker W...
AINA
2003
IEEE
15 years 7 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung