Sciweavers

1403 search results - page 241 / 281
» About Approximations of Exponentials
Sort
View
116
Voted
NETWORKING
2011
14 years 3 months ago
Modelling and Evaluation of CCN-Caching Trees
Networking Named Content (NNC) was recently proposed as a new networking paradigm to realise Content Centric Networks (CCNs). The new paradigm changes much about the current Intern...
Ioannis Psaras, Richard G. Clegg, Raul Landa, Wei ...
AAAI
2011
14 years 21 days ago
Learning Accuracy and Availability of Humans Who Help Mobile Robots
When mobile robots perform tasks in environments with humans, it seems appropriate for the robots to rely on such humans for help instead of dedicated human oracles or supervisors...
Stephanie Rosenthal, Manuela M. Veloso, Anind K. D...
125
Voted
ECOOP
2011
Springer
14 years 14 days ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich
199
Voted
GIS
2004
ACM
16 years 1 months ago
Energy efficient exact kNN search in wireless broadcast environments
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
Bugra Gedik, Aameek Singh, Ling Liu
111
Voted
STOC
2009
ACM
171views Algorithms» more  STOC 2009»
16 years 1 months ago
On the geometry of graphs with a forbidden minor
We study the topological simplification of graphs via random embeddings, leading ultimately to a reduction of the Gupta-Newman-Rabinovich-Sinclair (GNRS) L1 embedding conjecture t...
James R. Lee, Anastasios Sidiropoulos