Sciweavers

3154 search results - page 567 / 631
» Computing Closed Skycubes
Sort
View
EUROSYS
2008
ACM
15 years 8 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
HRI
2010
ACM
15 years 6 months ago
Lead me by the hand: evaluation of a direct physical interface for nursing assistant robots
—When a user is in close proximity to a robot, physical contact becomes a potentially valuable channel for communication. People often use direct physical contact to guide a pers...
Tiffany L. Chen, Charles C. Kemp
TEI
2010
ACM
110views Hardware» more  TEI 2010»
15 years 6 months ago
Empowering programmability for tangibles
Programming microcontrollers for tangible interfaces can be easier and more accessible than it is now, empowering a broader audience to participate. The first part of this studio ...
Eric Rosenbaum, Evelyn Eastmond, David Mellis
ICDE
2009
IEEE
133views Database» more  ICDE 2009»
15 years 6 months ago
STAR: Steiner-Tree Approximation in Relationship Graphs
— Large graphs and networks are abundant in modern information systems: entity-relationship graphs over relational data or Web-extracted entities, biological networks, social onl...
Gjergji Kasneci, Maya Ramanath, Mauro Sozio, Fabia...
PERCOM
2009
ACM
15 years 6 months ago
Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks
—This paper addresses the problem of providing congestion-management for a shared wireless sensor networkbased target tracking system. In many large-scale wireless sensor network...
Lei Chen 0005, Boleslaw K. Szymanski, Joel W. Bran...