Sciweavers

1244 search results - page 217 / 249
» The many faces of interpolation
Sort
View
MOBIHOC
2007
ACM
15 years 11 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
WWW
2010
ACM
15 years 6 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
CHI
2010
ACM
15 years 6 months ago
Bringing the field into focus: user-centered design of a patient expertise locator
Managing personal aspects of health is challenging for many patients, particularly those facing a serious condition such as cancer. Finding experienced patients, who can share the...
Andrea Civan-Hartzler, David W. McDonald, Chris Po...
SI3D
2009
ACM
15 years 6 months ago
Dynamic solid textures for real-time coherent stylization
Stylized rendering methods, which aim at depicting 3D scenes with 2D marks such as pigments or strokes, are often faced with temporal coherence issues when applied to dynamic scen...
Pierre Bénard, Adrien Bousseau, Joëlle...
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
15 years 6 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen