Sciweavers

1557 search results - page 52 / 312
» What can we do with a Solution
Sort
View
PC
2007
147views Management» more  PC 2007»
13 years 7 months ago
Thread-safety in an MPI implementation: Requirements and analysis
The MPI-2 Standard has carefully specified the interaction between MPI and usercreated threads. The goal of this specification is to allow users to write multithreaded MPI progr...
William Gropp, Rajeev Thakur
MICAI
2010
Springer
13 years 6 months ago
Supervised Machine Learning for Predicting the Meaning of Verb-Noun Combinations in Spanish
The meaning of such verb-noun combinations as take care, undertake work, pay attention can be generalized as DO what is designated by the noun. Likewise, the meaning of make a deci...
Olga Kolesnikova, Alexander F. Gelbukh
HRI
2010
ACM
14 years 2 months ago
Judging a bot by its cover: an experiment on expectation setting for personal robots
—Managing user expectations of personal robots becomes particularly challenging when the end-user just wants to know what the robot can do, and neither understands nor cares abou...
Steffi Paepcke, Leila Takayama
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
SPAA
2004
ACM
14 years 1 months ago
On achieving optimized capacity utilization in application overlay networks with multiple competing sessions
In this paper, we examine the problem of large-volume data dissemination via overlay networks. A natural way to maximize the throughput of an overlay multicast session is to split...
Yi Cui, Baochun Li, Klara Nahrstedt