Sciweavers

1022 search results - page 184 / 205
» Stable models and circumscription
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Approximation algorithms for throughput maximization in wireless networks with delay constraints
—We study the problem of throughput maximization in multi-hop wireless networks with end-to-end delay constraints for each session. This problem has received much attention start...
Guanhong Pei, V. S. Anil Kumar, Srinivasan Parthas...
ICCV
2011
IEEE
12 years 7 months ago
Gaussian Process Regression Flow for Analysis of Motion Trajectories
Recognition of motions and activities of objects in videos requires effective representations for analysis and matching of motion trajectories. In this paper, we introduce a new r...
Kihwan Kim, Dongryeol Lee, Irfan Essa
SIGGRAPH
2000
ACM
14 years 1 days ago
Animating explosions
In this paper, we introduce techniques for animating explosions and their effects. The primary effect of an explosion is a disturbance that causes a shock wave to propagate thro...
Gary D. Yngve, James F. O'Brien, Jessica K. Hodgin...
CHI
2007
ACM
14 years 8 months ago
How it works: a field study of non-technical users interacting with an intelligent system
In order to develop intelligent systems that attain the trust of their users, it is important to understand how users perceive such systems and develop those perceptions over time...
Joe Tullio, Anind K. Dey, Jason Chalecki, James Fo...
INFOCOM
2003
IEEE
14 years 29 days ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...