Sciweavers

3151 search results - page 575 / 631
» Using query term order for result summarisation
Sort
View
120
Voted
WWW
2010
ACM
15 years 10 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
131
Voted
HRI
2009
ACM
15 years 10 months ago
How search and its subtasks scale in N robots
The present study investigates the effect of the number of controlled robots on performance of an urban search and rescue (USAR) task using a realistic simulation. Participants co...
Huadong Wang, Michael Lewis, Prasanna Velagapudi, ...
127
Voted
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 10 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...
142
Voted
MOBICOM
2009
ACM
15 years 10 months ago
Capacity of large-scale CSMA wireless networks
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schem...
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
139
Voted
SIGMETRICS
2010
ACM
201views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Transparent, lightweight application execution replay on commodity multiprocessor operating systems
We present S, the first system to provide transparent, lowoverhead application record-replay and the ability to go live from replayed execution. S i...
Oren Laadan, Nicolas Viennot, Jason Nieh