Sciweavers

8135 search results - page 1485 / 1627
» network 2008
Sort
View
142
Voted
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
15 years 10 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi
137
Voted
HICSS
2008
IEEE
158views Biometrics» more  HICSS 2008»
15 years 10 months ago
Consensual Dynamics in Group Decision Making with Triangular Fuzzy Numbers
In this paper we study the modelling of consensus reaching in a ‘soft’ environment, i.e. when the individual testimonies are expressed as fuzzy preference relations. Here cons...
Mario Fedrizzi, Michele Fedrizzi, Ricardo A. Marqu...
117
Voted
HOTI
2008
IEEE
15 years 10 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
116
Voted
HOTI
2008
IEEE
15 years 10 months ago
OCDIMM: Scaling the DRAM Memory Wall Using WDM Based Optical Interconnects
—We present OCDIMM (Optically Connected DIMM), a CPU-DRAM interface that takes advantage of multiwavelength optical interconnects. We show that OCDIMM has at least three key bene...
Amit Hadke, Tony Benavides, S. J. Ben Yoo, Rajeeva...
87
Voted
IAT
2008
IEEE
15 years 10 months ago
Finding Minimum Data Requirements Using Pseudo-independence
In situations where Bayesian networks (BN) inferencing approximation is allowable, we show how to reduce the amount of sensory observations necessary and in a multi-agent context ...
Yoonheui Kim, Victor R. Lesser
« Prev « First page 1485 / 1627 Last » Next »