Sciweavers

8647 search results - page 1664 / 1730
» The Container Selection Problem
Sort
View
MOBICOM
2009
ACM
15 years 4 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
RECSYS
2009
ACM
15 years 4 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
SIGIR
2009
ACM
15 years 4 months ago
Query dependent pseudo-relevance feedback based on wikipedia
Pseudo-relevance feedback (PRF) via query-expansion has been proven to be effective in many information retrieval (IR) tasks. In most existing work, the top-ranked documents from...
Yang Xu, Gareth J. F. Jones, Bin Wang
VRCAI
2009
ACM
15 years 4 months ago
Towards Virtual Reality games
Game engines of cinematic quality, broadband networking and advances in Virtual Reality (VR) technologies are setting the stage to allow players to have shared, “better-than-lif...
Andrei Sherstyuk, Dale Vincent, Anton Treskunov
APSCC
2008
IEEE
15 years 4 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
« Prev « First page 1664 / 1730 Last » Next »