Sciweavers

1149 search results - page 228 / 230
» What Are Iteration Theories
Sort
View
BWCCA
2010
13 years 2 months ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...
JUCS
2010
109views more  JUCS 2010»
13 years 2 months ago
Semantics of Query-Driven Communication of Exact Values
: We address the question of how to communicate among distributed processes values such as real numbers, continuous functions and geometrical solids with arbitrary precision, yet e...
Michal Konecný, Amin Farjudian
AAMAS
2011
Springer
13 years 1 months ago
Aggregating value ranges: preference elicitation and truthfulness
We study the case where agents have preferences over ranges (intervals) of values, and we wish to elicit and aggregate these preferences. For example, consider a set of climatologi...
Joseph Farfel, Vincent Conitzer
CHI
2011
ACM
12 years 11 months ago
Should I open this email?: inbox-level cues, curiosity and attention to email
The quantity of email people receive each day can be overwhelming. Previous research suggests that when handling email, individuals prioritize certain messages for attention over ...
Jaclyn Wainer, Laura Dabbish, Robert Kraut
CHI
2011
ACM
12 years 11 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang