Sciweavers

5577 search results - page 210 / 1116
» E2K Technology and Implementation
Sort
View
TMC
2010
137views more  TMC 2010»
15 years 1 days ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
201
Voted
HICSS
2011
IEEE
264views Biometrics» more  HICSS 2011»
14 years 9 months ago
The Kukui Cup: A Dorm Energy Competition Focused on Sustainable Behavior Change and Energy Literacy
Abstract—The Kukui Cup is an advanced dorm energy competition whose goal is to investigate the relationships among energy literacy, sustained energy conservation, and information...
Robert S. Brewer, George E. Lee, Philip M. Johnson
CISS
2010
IEEE
14 years 9 months ago
Real-time video quality monitoring for mobile devices
Due to the explosion of various video applications and services it is becoming increasingly important to accurately measure video quality in real-time. Since reference information...
Tao Liu, G. Cash, Wen Chen, Chunhua Chen, Jeffrey ...
KCAP
2011
ACM
14 years 8 months ago
LinkedDataLens: linked data as a network of networks
With billions of assertions and counting, the Web of Data represents the largest multi-contributor interlinked knowledge base that ever existed. We present a novel framework for a...
Yolanda Gil, Paul T. Groth
SIGIR
2011
ACM
14 years 8 months ago
No free lunch: brute force vs. locality-sensitive hashing for cross-lingual pairwise similarity
This work explores the problem of cross-lingual pairwise similarity, where the task is to extract similar pairs of documents across two different languages. Solutions to this pro...
Ferhan Ture, Tamer Elsayed, Jimmy J. Lin