Sciweavers

7557 search results - page 1500 / 1512
» Constraints as a design pattern
Sort
View
ECOI
2010
144views more  ECOI 2010»
14 years 9 months ago
Machine reasoning about anomalous sensor data
We describe a semantic data validation tool that is capable of observing incoming real-time sensor data and performing reasoning against a set of rules specific to the scientific d...
Matt Calder, Robert A. Morris, Francesco Peri
104
Voted
GIS
2010
ACM
14 years 9 months ago
Location disambiguation in local searches using gradient boosted decision trees
Local search is a specialization of the web search that allows users to submit geographically constrained queries. However, one of the challenges for local search engines is to un...
Ritesh Agrawal, James G. Shanahan
IJHPCA
2010
117views more  IJHPCA 2010»
14 years 9 months ago
Fine-Grained Multithreading Support for Hybrid Threaded MPI Programming
As high-end computing systems continue to grow in scale, recent advances in multiand many-core architectures have pushed such growth toward more denser architectures, that is, mor...
Pavan Balaji, Darius Buntinas, David Goodell, Will...
84
Voted
INFOCOM
2010
IEEE
14 years 9 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
90
Voted
JSAC
2010
135views more  JSAC 2010»
14 years 9 months ago
Provisioning mission-critical telerobotic control systems over internet backbone networks with essentially-perfect QoS
—Over the next decades, the Internet will evolve to support increasingly complex mission-critical services such as telerobotically controlled surgery. The world’s first telero...
T. H. Szymanski, D. Gilbert
« Prev « First page 1500 / 1512 Last » Next »