Sciweavers

7978 search results - page 1506 / 1596
» Combining shared-coin algorithms
Sort
View
MOBICOM
2009
ACM
15 years 4 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
MOBICOM
2009
ACM
15 years 4 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
SIGCOMM
2009
ACM
15 years 4 months ago
PortLand: a scalable fault-tolerant layer 2 data center network fabric
This paper considers the requirements for a scalable, easily manageable, fault-tolerant, and efficient data center network fabric. Trends in multi-core processors, end-host virtua...
Radhika Niranjan Mysore, Andreas Pamboris, Nathan ...
SIGIR
2009
ACM
15 years 4 months ago
Positional language models for information retrieval
Although many variants of language models have been proposed for information retrieval, there are two related retrieval heuristics remaining “external” to the language modelin...
Yuanhua Lv, ChengXiang Zhai
SIGIR
2009
ACM
15 years 4 months ago
Risky business: modeling and exploiting uncertainty in information retrieval
Most retrieval models estimate the relevance of each document to a query and rank the documents accordingly. However, such an approach ignores the uncertainty associated with the ...
Jianhan Zhu, Jun Wang, Ingemar J. Cox, Michael J. ...
« Prev « First page 1506 / 1596 Last » Next »