Sciweavers

2736 search results - page 168 / 548
» Implementable allocation rules
Sort
View
CONEXT
2009
ACM
15 years 2 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
WSFM
2007
Springer
15 years 7 months ago
From Public Views to Private Views - Correctness-by-Design for Services
Service orientation is a means for integrating across diverse systems. Each resource, whether an application, system, or trading partner, can be accessed as a service. The resultin...
Wil M. P. van der Aalst, Niels Lohmann, Peter Mass...
CHI
2001
ACM
15 years 4 months ago
Automating camera management for lecture room environments
Given rapid improvements in network infrastructure and streaming-media technologies, a large number of corporations and universities are recording lectures and making them availab...
Qiong Liu, Yong Rui, Anoop Gupta, Jonathan J. Cadi...
DGO
2003
139views Education» more  DGO 2003»
15 years 2 months ago
Better Public Policy Through Natural Language Information Access
Federal agencies implement laws passed by the Congress by creating rules and regulations that can be applied in practice. During this process, staffs at the various agencies may r...
Boris Katz, Roger Hurwitz, Jimmy J. Lin, Özle...
IIS
2001
15 years 2 months ago
The Development of the AQ20 Learning System and Initial Experiments
: Research on a new system implementing the AQ learning methodology, called AQ20, is briefly described, and illustrated by initial results from an experimental version. Like its pr...
Guido Cervone, Liviu Panait, Ryszard S. Michalski