Sciweavers

5964 search results - page 1090 / 1193
» A theory of speculative computation
Sort
View
108
Voted
DPPI
2007
ACM
15 years 4 months ago
Reverse alarm clock: a research through design example of designing for the self
This paper documents a first attempt at "designing for the self", an approach to designing products intended to help people move closer to their idealized sense of self a...
Kursat Kursat Ozenc, James P. Brommer, Bong-keum J...
108
Voted
COMPGEOM
2010
ACM
15 years 4 months ago
Manifold reconstruction using tangential Delaunay complexes
We give a provably correct algorithm to reconstruct a kdimensional manifold embedded in d-dimensional Euclidean space. Input to our algorithm is a point sample coming from an unkn...
Jean-Daniel Boissonnat, Arijit Ghosh
ICDCS
2010
IEEE
15 years 4 months ago
Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks
—This research focuses on distributed and localized algorithms for precise boundary detection in 3D wireless networks. Our objectives are in two folds. First, we aim to identify ...
Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu
SIGIR
2010
ACM
15 years 4 months ago
Estimation of statistical translation models based on mutual information for ad hoc information retrieval
As a principled approach to capturing semantic relations of words in information retrieval, statistical translation models have been shown to outperform simple document language m...
Maryam Karimzadehgan, ChengXiang Zhai
SOUPS
2010
ACM
15 years 4 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
« Prev « First page 1090 / 1193 Last » Next »