Sciweavers

7648 search results - page 1126 / 1530
» A Data Locality Optimizing Algorithm
Sort
View
TSP
2008
118views more  TSP 2008»
15 years 4 months ago
Channel-Aware Random Access Control for Distributed Estimation in Sensor Networks
A cross-layered slotted ALOHA protocol is proposed and analyzed for distributed estimation in sensor networks. Suppose that the sensors in the network record local measurements of ...
Y.-W. P. Hong, Keng-U Lei, Chong-Yung Chi
IMC
2007
ACM
15 years 6 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
DEBS
2007
ACM
15 years 8 months ago
Scalable event matching for overlapping subscriptions in pub/sub systems
Content-based publish/subscribe systems allow matching the content of events with predicates in the subscriptions. However, most existing systems only allow a limited set of opera...
Zhen Liu, Srinivasan Parthasarathy 0002, Anand Ran...
ICCV
2009
IEEE
16 years 9 months ago
Automatic annotation of human actions in video
This paper addresses the problem of automatic temporal annotation of realistic human actions in video using mini- mal manual supervision. To this end we consider two asso- ciate...
Olivier Duchenne, Ivan Laptev, Josef Sivic, Franci...
ICML
2006
IEEE
16 years 5 months ago
Discriminative cluster analysis
Clustering is one of the most widely used statistical tools for data analysis. Among all existing clustering techniques, k-means is a very popular method because of its ease of pr...
Fernando De la Torre, Takeo Kanade
« Prev « First page 1126 / 1530 Last » Next »