Sciweavers

16606 search results - page 3236 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
105
Voted
CN
2007
116views more  CN 2007»
15 years 3 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
128
Voted
IOR
2006
126views more  IOR 2006»
15 years 3 months ago
A New Linear Programming Approach to Radiation Therapy Treatment Planning Problems
We consider the problem of radiation therapy treatment planning for cancer patients. During radiation therapy, beams of radiation pass through a patient, killing both cancerous an...
H. Edwin Romeijn, Ravindra K. Ahuja, James F. Demp...
137
Voted
IPM
2006
157views more  IPM 2006»
15 years 3 months ago
Collaborative bibliography
A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes as...
David G. Hendry, J. R. Jenkins, Joseph F. McCarthy
146
Voted
CSCW
2007
ACM
15 years 3 months ago
Supporting Community Emergency Management Planning through a Geocollaboration Software Architecture
Emergency management is more than just events occurring within an emergency situation. It encompasses a variety of persistent activities such as planning, training, assessment, and...
Wendy A. Schafer, Craig H. Ganoe, John M. Carroll
165
Voted
JSAC
2008
125views more  JSAC 2008»
15 years 3 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
« Prev « First page 3236 / 3322 Last » Next »