Sciweavers

2356 search results - page 434 / 472
» Characterizations of postman sets
Sort
View
122
Voted
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 6 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
CGI
2000
IEEE
15 years 6 months ago
To Gesture or Not to Gesture: What is the Question?
Computer synthesized characters are expected to make appropriate face, limb, and body gestures during communicative acts. We focus on non-facial movements and try to elucidate wha...
Norman I. Badler, Monica Costa, Liwei Zhao, Diane ...
124
Voted
ICMCS
2000
IEEE
84views Multimedia» more  ICMCS 2000»
15 years 6 months ago
Multi-modal Interaction in the Age of Information Appliances
The coming millenium will be characterized by the availability of multiple information appliances that make ubiquitous information access an accepted fact of life. The ability to ...
Stéphane H. Maes, T. V. Raman
AC
2000
Springer
15 years 6 months ago
The Join Calculus: A Language for Distributed Mobile Programming
In these notes, we give an overview of the join calculus, its semantics, and its equational theory. The join calculus is a language that models distributed and mobile programming. ...
Cédric Fournet, Georges Gonthier
ADBIS
2000
Springer
188views Database» more  ADBIS 2000»
15 years 6 months ago
Algorithms for Rewriting Aggregate Queries Using Views
Queries involving aggregation are typical in a number of database research areas, such as data warehousing, global information systems and mobile computing. One of the main ideas ...
Sara Cohen, Werner Nutt, Alexander Serebrenik