Sciweavers

1912 search results - page 371 / 383
» Don't Compare Averages
Sort
View
NECO
2007
112views more  NECO 2007»
14 years 11 months ago
Distortion of Neural Signals by Spike Coding
Analog neural signals must be converted into spike trains for transmission over electrically leaky axons. This spike encoding and subsequent decoding leads to distortion. We quant...
David H. Goldberg, Andreas G. Andreou
CORR
2010
Springer
130views Education» more  CORR 2010»
14 years 10 months ago
Distribution of Cognitive Load in Web Search
The search task and the system both affect the demand on cognitive resources during information search. In some situations, the demands may become too high for a person. This arti...
Jacek Gwizdka
87
Voted
CORR
2010
Springer
58views Education» more  CORR 2010»
14 years 10 months ago
Liquidity in Credit Networks: A Little Trust Goes a Long Way
Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each ot...
Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian...
ICRA
2010
IEEE
121views Robotics» more  ICRA 2010»
14 years 10 months ago
Real-world validation of three tipover algorithms for mobile robots
— Mobile robot tipover is a concern as it can create dangerous situations for operators and bystanders, cause collateral damage to the surrounding environment, and result in an a...
Philip R. Roan, Aaron Burmeister, Amin Rahimi, Kev...
105
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...