Sciweavers

14386 search results - page 2617 / 2878
» Algorithms for user interfaces
Sort
View
172
Voted
TELETRAFFIC
2007
Springer
15 years 10 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
WAPCV
2007
Springer
15 years 10 months ago
Embodied Active Vision in Language Learning and Grounding
Abstract. Most cognitive studies of language acquisition in both natural systems and artificial systems have focused on the role of purely linguistic information as the central co...
Chen Yu
FOCS
2006
IEEE
15 years 10 months ago
Explicit Exclusive Set Systems with Applications to Broadcast Encryption
A family of subsets C of [n] def = {1, . . . , n} is (r, t)exclusive if for every S ⊂ [n] of size at least n − r, there exist S1, . . . , St ∈ C with S = S1∪S2∪· · · ...
Craig Gentry, Zulfikar Ramzan, David P. Woodruff
VTC
2006
IEEE
121views Communications» more  VTC 2006»
15 years 10 months ago
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...
Katia Jaffrès-Runser, Jean-Marie Gorce, St&...
CIKM
2005
Springer
15 years 10 months ago
Biasing web search results for topic familiarity
Depending on a web searcher’s familiarity with a query’s target topic, it may be more appropriate to show her introductory or advanced documents. The TREC HARD [1] track defi...
Giridhar Kumaran, Rosie Jones, Omid Madani
« Prev « First page 2617 / 2878 Last » Next »