• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,430
Next 10 →

Future Design Mindful of the

by George W. Furnas
"... As human–computer interaction (HCI) expands its scope, the proper context for the design of information technology (IT) is increasingly an interconnected mosaic of responsive adaptive systems (MoRAS) including people’s heads, or-ganizations, communities, markets, and cultures. The introduction of IT ..."
Abstract - Add to MetaCart
to understand the role of all these different systems in the outcome explains why IT design has become an increasingly interdisciplinary effort. It is likely that our designs will be more successful if we become more mindful of this bigger picture. This article discusses the motivations for the Mo

Essays on Designing Minds

by Hilary Putnam, Ned Block, Stephen L. White, The Unity Of The Self, Christopher Peacocke, A Study Of Concepts, John R. Searle, The Rediscovery Of The Mind, John Campbell, Hao Wang, A Logical, Journey From, Gödel Philosophy, Jerrold J. Katz, Realistic Rationalism, Daniel C. Dennett, Daniel C. Dennett, A Bradford Book
"... Page iii Page iv All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in Palatino by Achorn Graphic S ..."
Abstract - Add to MetaCart
Page iii Page iv All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in Palatino by Achorn Graphic Services and was printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data

A blueprint for introducing disruptive technology into the internet

by Larry Peterson, Tom Anderson, David Culler, Timothy Roscoe , 2002
"... This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports bot ..."
Abstract - Cited by 593 (43 self) - Add to MetaCart
architecture. Towards this end, the paper also briefly describes PlanetLab, an overlay network being designed with these four principles in mind.

Approximate Signal Processing

by S. Hamid Nawab, Alan V. Oppenheim, Anantha P. Chandrakasan, Joseph M. Winograd, Jeffrey T. Ludwig , 1997
"... It is increasingly important to structure signal processing algorithms and systems to allow for trading off between the accuracy of results and the utilization of resources in their implementation. In any particular context, there are typically a variety of heuristic approaches to managing these tra ..."
Abstract - Cited by 538 (2 self) - Add to MetaCart
number of ideas and approaches to approximate processing as currently being formulated in the computer science community. We then present four examples of signal processing algorithms/systems that are structured with these goals in mind. These examples may be viewed as partial inroads toward the ultimate

Wavelet-based statistical signal processing using hidden Markov models

by Matthew S. Crouse, Robert D. Nowak, Richard G. Baraniuk - IEEE TRANSACTIONS ON SIGNAL PROCESSING , 1998
"... Wavelet-based statistical signal processing techniques such as denoising and detection typically model the wavelet coefficients as independent or jointly Gaussian. These models are unrealistic for many real-world signals. In this paper, we develop a new framework for statistical signal processing b ..."
Abstract - Cited by 415 (50 self) - Add to MetaCart
based on wavelet-domain hidden Markov models (HMM’s) that concisely models the statistical dependencies and non-Gaussian statistics encountered in real-world signals. Wavelet-domain HMM’s are designed with the intrinsic properties of the wavelet transform in mind and provide powerful, yet tractable

How to improve Bayesian reasoning without instruction: Frequency formats

by Gerd Gigerenzer, Ulrich Hoffrage - Psychological Review , 1995
"... Is the mind, by design, predisposed against performing Bayesian inference? Previous research on base rate neglect suggests that the mind lacks the appropriate cognitive algorithms. However, any claim against the existence of an algorithm, Bayesian or otherwise, is impossible to evaluate unless one s ..."
Abstract - Cited by 396 (29 self) - Add to MetaCart
Is the mind, by design, predisposed against performing Bayesian inference? Previous research on base rate neglect suggests that the mind lacks the appropriate cognitive algorithms. However, any claim against the existence of an algorithm, Bayesian or otherwise, is impossible to evaluate unless one

Designing Mind-Based Media and Communications Technologies

by Timo Saari D. Soc. Sc
"... The paper addresses the question of the influence of form of information and technology used to deliver the information on the psychological effects of a single user of technology. First, information is divided into substance and form. Then the interaction of form of information and the technology c ..."
Abstract - Add to MetaCart
effects and the multimodality of perceptual processing are presented. Finally, the design rules for individualized psychological effects are presented as creating potentially new types of

Evolution: The Computer Systems Engineer Designing Minds 1

by Aaron Sloman
"... What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution b ..."
Abstract - Add to MetaCart
by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which we have only recently learnt how to design and build, and could not even have been thought

Iolus: A Framework for Scalable Secure Multicasting

by Suvo Mittra , 1997
"... As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing ..."
Abstract - Cited by 325 (0 self) - Add to MetaCart
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show

Efficient routing in intermittently connected mobile networks: The multiple-copy case

by Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra , 2008
"... Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc net ..."
Abstract - Cited by 303 (18 self) - Add to MetaCart
, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that “spray
Next 10 →
Results 1 - 10 of 5,430
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University