Sciweavers

8740 search results - page 1679 / 1748
» The Management of Replicated Data
Sort
View
LOCA
2009
Springer
15 years 11 months ago
Error Estimation for Indoor 802.11 Location Fingerprinting
802.11-based indoor positioning systems have been under research for quite some time now. However, despite the large attention this topic has gained, most of the research focused o...
Hendrik Lemelson, Mikkel Baun Kjærgaard, Ren...
MHCI
2009
Springer
15 years 11 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs
MIDDLEWARE
2009
Springer
15 years 11 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
CASES
2009
ACM
15 years 11 months ago
A platform for developing adaptable multicore applications
Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previ...
Dan Fay, Li Shang, Dirk Grunwald
156
Voted
ISSTA
2009
ACM
15 years 11 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
« Prev « First page 1679 / 1748 Last » Next »