Sciweavers

9316 search results - page 1808 / 1864
» Analysis of traceback techniques
Sort
View
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 1 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
CHI
2010
ACM
15 years 1 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
ADHOCNETS
2009
Springer
15 years 9 days ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
ECCV
2010
Springer
15 years 9 days ago
Depth-Encoded Hough Voting for joint object detection and shape recovery
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...
MOBISYS
2010
ACM
15 years 6 days ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
« Prev « First page 1808 / 1864 Last » Next »