Sciweavers

1320 search results - page 132 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
RTCSA
2006
IEEE
15 years 6 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
87
Voted
CHI
2010
ACM
15 years 7 months ago
First-person cooking: a dual-perspective interactive kitchen counter
Hobby chefs have various ways to learn cooking—paper recipes or cooking shows, for example. However, information in paper recipes may require prior experience to be understood a...
Sarah Mennicken, Thorsten Karrer, Peter Russell, J...
TON
2010
163views more  TON 2010»
14 years 11 months ago
Toward practical opportunistic routing with intra-session network coding for mesh networks
—We consider opportunistic routing in wireless mesh networks. We exploit the inherent diversity of the broadcast nature of wireless by making use of multi-path routing. We presen...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...
104
Voted
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 1 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
112
Voted
CN
2006
73views more  CN 2006»
15 years 26 days ago
Rate-distortion based link state update
Finding paths that satisfy the performance requirements of applications according to the link state information in a network is known as the quality-of-service (QoS) routing probl...
Gang Cheng, Nirwan Ansari