Sciweavers

6894 search results - page 1340 / 1379
» On network interference management
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 6 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SOUPS
2009
ACM
15 years 6 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
SIGCSE
2010
ACM
186views Education» more  SIGCSE 2010»
15 years 6 months ago
Teaching operating systems using virtual appliances and distributed version control
Students learn more through hands-on project experience for computer science courses such as operating systems, but providing the infrastructure support for a large class to learn...
Oren Laadan, Jason Nieh, Nicolas Viennot
CISS
2008
IEEE
15 years 6 months ago
Reconstruction of compressively sensed images via neurally plausible local competitive algorithms
Abstract—We develop neurally plausible local competitive algorithms (LCAs) for reconstructing compressively sensed images. Reconstruction requires solving a sparse approximation ...
Robert L. Ortman, Christopher J. Rozell, Don H. Jo...
CLADE
2008
IEEE
15 years 6 months ago
SWARM: a scientific workflow for supporting bayesian approaches to improve metabolic models
With the exponential growth of complete genome sequences, the analysis of these sequences is becoming a powerful approach to build genome-scale metabolic models. These models can ...
Xinghua Shi, Rick Stevens
« Prev « First page 1340 / 1379 Last » Next »