Sciweavers

15073 search results - page 2959 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
67
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
SMS-based contextual web search
SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes (typically 1-2 SMS messages...
Jay Chen, Brendan Linn, Lakshminarayanan Subramani...
86
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Game action based power management for multiplayer online game
Current mobile devices embrace a wide range of functionalities including high speed network support, hardware accelerated 3D graphics, and multimedia capabilities. These capabilit...
Bhojan Anand, Akkihebbal L. Ananda, Mun Choon Chan...
ICASSP
2008
IEEE
15 years 4 months ago
Filter bank design based on minimization of individual aliasing terms for minimum mutual information subband adaptive beamformin
This paper presents new filter bank design methods for subband adaptive beamforming. In this work, we design analysis and synthesis prototypes for modulated filter banks so as t...
Ken'ichi Kumatani, John W. McDonough, S. Schachl, ...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 4 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
P2P
2008
IEEE
15 years 4 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
« Prev « First page 2959 / 3015 Last » Next »