Sciweavers

1675 search results - page 273 / 335
» The Value of a Good Name
Sort
View
CHI
2006
ACM
14 years 9 months ago
Olfoto: designing a smell-based interaction
We present a study into the use of smell for searching digital photo collections. Many people now have large photo libraries on their computers and effective search tools are need...
Stephen A. Brewster, David K. McGookin, Christophe...
EDBT
2008
ACM
128views Database» more  EDBT 2008»
14 years 8 months ago
Processing transitive nearest-neighbor queries in multi-channel access environments
Wireless broadcast is an efficient way for information dissemination due to its good scalability [10]. Existing works typically assume mobile devices, such as cell phones and PDAs...
Xiao Zhang, Wang-Chien Lee, Prasenjit Mitra, Baihu...
MOBIHOC
2007
ACM
14 years 8 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
ICCAD
2004
IEEE
102views Hardware» more  ICCAD 2004»
14 years 5 months ago
True crosstalk aware incremental placement with noise map
Crosstalk noise has become an important issue as technology scales down for timing and signal integrity closure. Existing works to fix crosstalk noise are mostly done at the rout...
Haoxing Ren, David Zhigang Pan, Paul Villarrubia
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 5 months ago
Almost Optimal Bounds for Direct Product Threshold Theorem
Abstract. We consider weakly-verifiable puzzles which are challengeresponse puzzles such that the responder may not be able to verify for itself whether it answered the challenge ...
Charanjit S. Jutla