Sciweavers

3151 search results - page 575 / 631
» Using query term order for result summarisation
Sort
View
WWW
2010
ACM
15 years 11 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
HRI
2009
ACM
15 years 11 months ago
How search and its subtasks scale in N robots
The present study investigates the effect of the number of controlled robots on performance of an urban search and rescue (USAR) task using a realistic simulation. Participants co...
Huadong Wang, Michael Lewis, Prasanna Velagapudi, ...
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 10 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...
MOBICOM
2009
ACM
15 years 10 months ago
Capacity of large-scale CSMA wireless networks
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schem...
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
SIGMETRICS
2010
ACM
201views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Transparent, lightweight application execution replay on commodity multiprocessor operating systems
We present S, the first system to provide transparent, lowoverhead application record-replay and the ability to go live from replayed execution. S i...
Oren Laadan, Nicolas Viennot, Jason Nieh