Sciweavers

3937 search results - page 278 / 788
» Questioning Ubiquitous Computing
Sort
View
GI
2004
Springer
15 years 10 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
SOFSEM
2004
Springer
15 years 10 months ago
Avoiding Forbidden Submatrices by Row Deletions
We initiate a systematic study of the Row Deletion(B) problem on matrices: For a ï¬xed “forbidden submatrix†B, the question is, given an input matrix A (both A and B have ent...
Sebastian Wernicke, Jochen Alber, Jens Gramm, Jion...
IWPC
2003
IEEE
15 years 10 months ago
Are Decomposition Slices Clones?
When computing program slices on all variables in a system, we observed that many of these slices are the same. This leads to the question: Are we looking at software clones? We d...
Keith Gallagher, Lucas Layman
SBP
2010
Springer
15 years 10 months ago
State-Dependent Risk Preferences in Evolutionary Games
Abstract. There is much empirical evidence that human decisionmaking under risk does not correspond the decision-theoretic notion of “rational†decision making, namely to make ...
Patrick Roos, Dana S. Nau
ECCV
2010
Springer
15 years 9 months ago
Detecting Faint Curved Edges in Noisy Images
A fundamental question for edge detection is how faint an edge can be and still be detected. In this paper we offer a formalism to study this question and subsequently introduce a...