Sciweavers

7557 search results - page 1500 / 1512
» Constraints as a design pattern
Sort
View
ECOI
2010
144views more  ECOI 2010»
15 years 15 days ago
Machine reasoning about anomalous sensor data
We describe a semantic data validation tool that is capable of observing incoming real-time sensor data and performing reasoning against a set of rules specific to the scientific d...
Matt Calder, Robert A. Morris, Francesco Peri
GIS
2010
ACM
15 years 14 days ago
Location disambiguation in local searches using gradient boosted decision trees
Local search is a specialization of the web search that allows users to submit geographically constrained queries. However, one of the challenges for local search engines is to un...
Ritesh Agrawal, James G. Shanahan
IJHPCA
2010
117views more  IJHPCA 2010»
15 years 12 days ago
Fine-Grained Multithreading Support for Hybrid Threaded MPI Programming
As high-end computing systems continue to grow in scale, recent advances in multiand many-core architectures have pushed such growth toward more denser architectures, that is, mor...
Pavan Balaji, Darius Buntinas, David Goodell, Will...
INFOCOM
2010
IEEE
15 years 11 days ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
JSAC
2010
135views more  JSAC 2010»
15 years 11 days ago
Provisioning mission-critical telerobotic control systems over internet backbone networks with essentially-perfect QoS
—Over the next decades, the Internet will evolve to support increasingly complex mission-critical services such as telerobotically controlled surgery. The world’s first telero...
T. H. Szymanski, D. Gilbert
« Prev « First page 1500 / 1512 Last » Next »