Sciweavers

922 search results - page 183 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
MOBICOM
2004
ACM
13 years 11 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
WWW
2008
ACM
14 years 6 months ago
The seamless browser: enhancing the speed of web browsing by zooming and preview thumbnails
In this paper, we present a new web browsing system, Seamless Browser, for fast link traversal on a large screen like TV In navigating web, users mainly suffer from cognitive over...
ByungIn Yoo, JongHo Lea, YeunBae Kim
WWW
2007
ACM
14 years 6 months ago
Answering bounded continuous search queries in the world wide web
Search queries applied to extract relevant information from the World Wide Web over a period of time may be denoted as continuous search queries. The improvement of continuous sea...
Dirk Kukulenz, Alexandros Ntoulas
ICFP
2009
ACM
14 years 6 months ago
Causal commutative arrows and their optimization
re a popular form of abstract computation. Being more general than monads, they are more broadly applicable, and in parare a good abstraction for signal processing and dataflow co...
Hai Liu, Eric Cheng, Paul Hudak
GECCO
2009
Springer
111views Optimization» more  GECCO 2009»
14 years 6 days ago
Evolving quorum sensing in digital organisms
For centuries it was thought that bacteria live asocial lives. However, recent discoveries show many species of bacteria communicate in order to perform tasks previously thought t...
Benjamin E. Beckmann, Philip K. McKinley