• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 29,502
Next 10 →

Pervasive Computing: Vision and Challenges

by M. Satyanarayanan - IEEE Personal Communications , 2001
"... This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smar ..."
Abstract - Cited by 686 (22 self) - Add to MetaCart
This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use

Random Key Predistribution Schemes for Sensor Networks”,

by Haowen Chan , Adrian Perrig , Dawn Song - IEEE Symposium on Security and Privacy, , 2003
"... Abstract Efficient key distribution is the basis for providing secure communication, a necessary requirement for many emerging sensor network applications. Many applications require authentic and secret communication among neighboring sensor nodes. However, establishing keys for secure communicatio ..."
Abstract - Cited by 832 (12 self) - Add to MetaCart
Abstract Efficient key distribution is the basis for providing secure communication, a necessary requirement for many emerging sensor network applications. Many applications require authentic and secret communication among neighboring sensor nodes. However, establishing keys for secure

Key Challenges in Communication . . .

by Gaetano Borriello , 2002
"... fic web site and enter their current location and destination. Although this is a powerful capability, it nonetheless requires the user to remember to check in a timely manner to adjust their route or leave earlier than forecast and to enter mundane data into the user interface. In ubiquitous comput ..."
Abstract - Add to MetaCart
fic web site and enter their current location and destination. Although this is a powerful capability, it nonetheless requires the user to remember to check in a timely manner to adjust their route or leave earlier than forecast and to enter mundane data into the user interface. In ubiquitous computing, an autonomous agent would constantly be checking the user's current location (available from GPS or in-building wireless infrastructure) and their calendar to determine if an adjustment in schedule should be made. If traffic conditions warrant it, the user can be signaled and their PDA can show a brief reminder with the minutes left before they should head off. Another example uses a biologist in a laboratory that would like to record all the steps in their experimental protocol so that others can faithfully reproduce them. Traditional computing would provide the biologist with a PDA or laptop in which to enter each step but requiring the biologist to interrupt the flow of their work to

Next Century Challenges: Mobile Networking for “Smart Dust”

by J. M. Kahn, R. H. Katz , K. S. J. Pister , 1999
"... Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have led to dramatic reductions in size, power consumption and cost for digital circuitry, wire-less communications and Micro ElectroMechanical Systems (MEMS). Th ..."
Abstract - Cited by 625 (1 self) - Add to MetaCart
the key elements of the emergent technology of “Smart Dust ” and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.

A Delay-Tolerant Network Architecture for Challenged Internets

by Kevin Fall , 2003
"... The highly successful architecture and protocols of today’s Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme env ..."
Abstract - Cited by 953 (12 self) - Add to MetaCart
expectations of end-to-end connectivity and node resources. The architecture operates as an overlay above the transport layers of the networks it interconnects, and provides key services such as in-network data storage and retransmission, interoperable naming, authenticated forwarding and a coarse

Dynamo: amazon’s highly available key-value store

by Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, Werner Vogels - IN PROC. SOSP , 2007
"... Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significant financial consequences and impacts customer trust. The Amazon.com platform, which provides services for many web sites ..."
Abstract - Cited by 684 (0 self) - Add to MetaCart
Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significant financial consequences and impacts customer trust. The Amazon.com platform, which provides services for many web

Large margin methods for structured and interdependent output variables

by Ioannis Tsochantaridis, Thorsten Joachims, Thomas Hofmann, Yasemin Altun - JOURNAL OF MACHINE LEARNING RESEARCH , 2005
"... Learning general functional dependencies between arbitrary input and output spaces is one of the key challenges in computational intelligence. While recent progress in machine learning has mainly focused on designing flexible and powerful input representations, this paper addresses the complementary ..."
Abstract - Cited by 624 (12 self) - Add to MetaCart
Learning general functional dependencies between arbitrary input and output spaces is one of the key challenges in computational intelligence. While recent progress in machine learning has mainly focused on designing flexible and powerful input representations, this paper addresses

Recognizing action at a distance

by Alexei A. Efros, Alexander C. Berg, Greg Mori, Jitendra Malik - PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION , 2003
"... Our goal is to recognize human actions at a distance, at resolutions where a whole person may be, say, 30 pixels tall. We introduce a novel motion descriptor based on optical flow measurements in a spatio-temporal volume for each stabilized human figure, and an associated similarity measure to be us ..."
Abstract - Cited by 504 (20 self) - Add to MetaCart
to be used in a nearest-neighbor framework. Making use of noisy optical flow measurements is the key challenge, which is addressed by treating optical flow not as precise pixel displacements, but rather as a spatial pattern of noisy measurements which are carefully smoothed and aggregated to form our spatio

Integration of ICT in Education: Key Challenges

by Munienge Mbodila¹ , Telisa Jones² , Kikunga Muhandji³
"... In many countries, education is more than a means for enabling progress and avoiding poverty; it is also critical for the development of knowledge societies and knowledge-based economies. It has been suggested that information and communication technologies (ITCs) can play a number of roles in educ ..."
Abstract - Add to MetaCart
and globalization is to provide individuals the ability to transform information into socially beneficial knowledge, skills, and value; modernize societies and improve the standard of living (Masood, 2010, Kong and Li, 2009 and Ng et al., 2006). This paper examined some key challenges faced by the higher education

Selection of relevant features and examples in machine learning

by Avrim L. Blum, Pat Langley - ARTIFICIAL INTELLIGENCE , 1997
"... In this survey, we review work in machine learning on methods for handling data sets containing large amounts of irrelevant information. We focus on two key issues: the problem of selecting relevant features, and the problem of selecting relevant examples. We describe the advances that have been mad ..."
Abstract - Cited by 606 (2 self) - Add to MetaCart
In this survey, we review work in machine learning on methods for handling data sets containing large amounts of irrelevant information. We focus on two key issues: the problem of selecting relevant features, and the problem of selecting relevant examples. We describe the advances that have been
Next 10 →
Results 1 - 10 of 29,502
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University