Sciweavers

6274 search results - page 1187 / 1255
» From query complexity to computational complexity
Sort
View
DCOSS
2009
Springer
15 years 10 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...
ISEUD
2009
Springer
15 years 10 months ago
Improving Documentation for eSOA APIs through User Studies
All software today is written using libraries, toolkits, frameworks and other application programming interfaces (APIs). We performed a user study of the online documentation a lar...
Sae Young Jeong, Yingyu Xie, Jack Beaton, Brad A. ...
COMPGEOM
2009
ACM
15 years 10 months ago
Proximity of persistence modules and their diagrams
Topological persistence has proven to be a key concept for the study of real-valued functions defined over topological spaces. Its validity relies on the fundamental property tha...
Frédéric Chazal, David Cohen-Steiner...
ICRA
2008
IEEE
190views Robotics» more  ICRA 2008»
15 years 10 months ago
Auditory mood detection for social and educational robots
— Social robots face the fundamental challenge of detecting and adapting their behavior to the current social mood. For example, robots that assist teachers in early education mu...
Paul Ruvolo, Ian R. Fasel, Javier R. Movellan
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 10 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
« Prev « First page 1187 / 1255 Last » Next »