Sciweavers

20294 search results - page 3968 / 4059
» Algorithmic Information Theory
Sort
View
ICMI
2005
Springer
104views Biometrics» more  ICMI 2005»
15 years 10 months ago
Analyzing and predicting focus of attention in remote collaborative tasks
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...
IPTPS
2005
Springer
15 years 10 months ago
Dynamic Load Balancing in Distributed Hash Tables
In Peer-to-Peer networks based on consistent hashing and ring topology each server is responsible for an interval chosen (pseudo-)randomly on a circle. The topology of the network...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...
ISW
2005
Springer
15 years 10 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
KDD
2005
ACM
139views Data Mining» more  KDD 2005»
15 years 10 months ago
Learning to predict train wheel failures
This paper describes a successful but challenging application of data mining in the railway industry. The objective is to optimize maintenance and operation of trains through prog...
Chunsheng Yang, Sylvain Létourneau
LCPC
2005
Springer
15 years 10 months ago
Manipulating MAXLIVE for Spill-Free Register Allocation
Abstract. Many embedded systems use single-chip microcontrollers which have no on-chip RAM. In such a system, the processor registers must hold all live data values. Nanocontroller...
Shashi Deepa Arcot, Henry G. Dietz, Sarojini Priya...
« Prev « First page 3968 / 4059 Last » Next »