Sciweavers

1192 search results - page 136 / 239
» Computing Weakest Readings
Sort
View
170
Voted
DCOSS
2007
Springer
15 years 9 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
157
Voted
JCDL
2005
ACM
111views Education» more  JCDL 2005»
15 years 9 months ago
Digitization and 3D modeling of movable books
Movable books provide interesting challenges for digitization and user interfaces design. We report in this paper some preliminary results in the building of a 3D visualization wo...
Pierre Cubaud, Jérôme Dupire, Alexand...
129
Voted
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 9 months ago
Sharing encountered information: digital libraries get a social life
As part of a more extensive study of reading-related practices, we have explored how people share information they encounter in their everyday reading as a complement to the more ...
Catherine C. Marshall, Sara A. Bly
152
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin
119
Voted
WDAG
1989
Springer
62views Algorithms» more  WDAG 1989»
15 years 7 months ago
Possibility and Impossibility Results in a Shared Memory Environment
We focus on unreliable asynchronous shared memory model which support only atomic read and write operations. For such a model we provide a necessary condition for the solvability ...
Gadi Taubenfeld, Shlomo Moran