Sciweavers

2316 search results - page 335 / 464
» The many forms of hypercomputation
Sort
View
DAC
2007
ACM
16 years 5 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
WWW
2007
ACM
16 years 5 months ago
SPARQ2L: towards support for subgraph extraction queries in rdf databases
Many applications in analytical domains often have the need to "connect the dots" i.e., query about the structure of data. In bioinformatics for example, it is typical t...
Kemafor Anyanwu, Angela Maduko, Amit P. Sheth
WWW
2005
ACM
16 years 5 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen
CHI
2009
ACM
16 years 5 months ago
Cheese cam: unconscious interaction between humans and a digital camera
In everyday life, humans interact with many products. In many of these interactions, a person performs an action with, toward, or in the vicinity of a product and then the product...
Boram Lee, Woohun Lee
EWSN
2009
Springer
16 years 5 months ago
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
As many radio chips used in today's sensor mote hardware can work at different frequencies, several multi-channel communication protocols have recently been proposed to improv...
Xiaodong Wang, Xiaorui Wang, Xing Fu, Guoliang Xin...