Sciweavers

6434 search results - page 1101 / 1287
» Model Transformations with Reference Models
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
16 years 3 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
SENSYS
2009
ACM
15 years 10 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
133
Voted
ATAL
2009
Springer
15 years 10 months ago
Increasing the expressiveness of virtual agents: autonomous generation of speech and gesture for spatial description tasks
Embodied conversational agents are required to be able to express themselves convincingly and autonomously. Based on an empirial study on spatial descriptions of landmarks in dire...
Kirsten Bergmann, Stefan Kopp
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
15 years 10 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
123
Voted
ICC
2008
IEEE
15 years 9 months ago
GORA: Goodput Optimal Rate Adaptation for 802.11 Using Medium Status Estimation
Abstract—Rate Adaptation for 802.11 has been deeply investigated in the past, but the problem of achieving optimal Rate Adaptation with respect not only to channel-related errors...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
« Prev « First page 1101 / 1287 Last » Next »