Sciweavers

736 search results - page 70 / 74
» Distributed attention
Sort
View
137 views 110 votes 15 years 7 months ago  MOBICOM 1999»
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
134 views 114 votes 15 years 4 months ago  ECIS 2000»
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
101 views 118 votes 15 years 7 months ago  NOMS 2000»
Mobile agent frameworks have attracted a lot of attention in recent years, seen as counterparts of static distributed object frameworks but allowing also for object or agent mobil...
164 views 151 votes 15 years 7 months ago  VISUALIZATION 1997»
The term Tele-Immersion was first used in October 1996 as the title of a workshop the Electronic Visualization Laboratory (EVL) at University of Illinois at Chicago (UIC) organize...
171 views 142 votes 15 years 1 months ago  P2P 2010»
—P2P streaming has attracted much attention recently with promises for higher revenues and better load distribution. Still, the majority of P2P video streaming systems today empl...
125 views 126 votes 14 years 9 months ago  JDCTA 2010»
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
243 views 257 votes 13 years 5 months ago  SIGIR 2012»
As ever-larger training sets for learning to rank are created, scalability of learning has become increasingly important to achieving continuing improvements in ranking accuracy [...
238 views 130 votes 15 years 9 months ago  ANSS 2007»
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity ...
85 views 109 votes 16 years 3 months ago  ICPR 2000»
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
117 views 103 votes 16 years 3 months ago  WWW 2002»
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...