Sciweavers

2266 search results - page 439 / 454
» How Not to Evaluate a Developmental System
Sort
View
WEBI
2007
Springer
15 years 3 months ago
Concordance-Based Entity-Oriented Search
— We consider the problem of finding the relevant named entities in response to a search query over a given text corpus. Entity search can readily be used to augment conventiona...
Mikhail Bautin, Steven Skiena
ICNP
2006
IEEE
15 years 3 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
ISM
2006
IEEE
103views Multimedia» more  ISM 2006»
15 years 3 months ago
A Study of Collaborative Dancing in Tele-immersive Environments
We first present the tele-immersive environments developed jointly by University of Illinois at Urbana-Champaign and University of California at Berkeley. The environment feature...
Zhenyu Yang, Bin Yu, Wanmin Wu, Klara Nahrstedt, R...
86
Voted
DAC
2006
ACM
15 years 3 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
SASN
2006
ACM
15 years 3 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt