Sciweavers

18306 search results - page 3111 / 3662
» Algorithmics in Exponential Time
Sort
View
UIST
2006
ACM
15 years 11 months ago
Summarizing personal web browsing sessions
We describe a system, implemented as a browser extension, that enables users to quickly and easily collect, view, and share personal Web content. Our system employs a novel intera...
Mira Dontcheva, Steven M. Drucker, Geraldine Wade,...
UIST
2006
ACM
15 years 11 months ago
Comparing and managing multiple versions of slide presentations
Despite the ubiquity of slide presentations, managing multiple presentations remains a challenge. Understanding how multiple versions of a presentation are related to one another,...
Steven M. Drucker, Georg Petschnigg, Maneesh Agraw...
VRST
2006
ACM
15 years 11 months ago
P2P Network for very large virtual environment
The ever increasing speed of Internet connections has led to a point where it is actually possible for every end user to seamlessly share data on Internet. Peer-To-Peer (P2P) netw...
Romain Cavagna, Christian Bouville, Jér&oci...
123
Voted
WS
2006
ACM
15 years 11 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
155
Voted
AINA
2005
IEEE
15 years 10 months ago
Nodes Localization through Data Fusion in Sensor Network
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Ren C. Luo, Ogst Chen, Liang Chao Tu
« Prev « First page 3111 / 3662 Last » Next »