Sciweavers

13895 search results - page 2395 / 2779
» Exploring
Sort
View
HPCA
2009
IEEE
15 years 11 months ago
Soft error vulnerability aware process variation mitigation
As transistor process technology approaches the nanometer scale, process variation significantly affects the design and optimization of high performance microprocessors. Prior stu...
Xin Fu, Tao Li, José A. B. Fortes
ICDE
2009
IEEE
171views Database» more  ICDE 2009»
15 years 11 months ago
CoTS: A Scalable Framework for Parallelizing Frequency Counting over Data Streams
Applications involving analysis of data streams have gained significant popularity and importance. Frequency counting, frequent elements and top-k queries form a class of operato...
Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr ...
PERCOM
2009
ACM
15 years 11 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
HRI
2009
ACM
15 years 11 months ago
An affective guide robot in a shopping mall
To explore possible robot tasks in daily life, we developed a guide robot for a shopping mall and conducted a field trial with it. The robot was designed to interact naturally wit...
Takayuki Kanda, Masahiro Shiomi, Zenta Miyashita, ...
OZCHI
2009
ACM
15 years 11 months ago
Brute force interactions: leveraging intense physical actions in gaming
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer interfaces so far have mainly focused on interactions ...
Florian Mueller, Stefan Agamanolis, Frank Vetere, ...
« Prev « First page 2395 / 2779 Last » Next »