Sciweavers

17770 search results - page 3131 / 3554
» A Generalization of Forward-Backward Algorithm
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 10 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
KCAP
2003
ACM
15 years 10 months ago
Building large knowledge bases by mass collaboration
Acquiring knowledge has long been the major bottleneck preventing the rapid spread of AI systems. Manual approaches are slow and costly. Machine-learning approaches have limitatio...
Matthew Richardson, Pedro Domingos
163
Voted
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 10 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...
MOBICOM
2003
ACM
15 years 10 months ago
Range-free localization schemes for large scale sensor networks
Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent...
Tian He, Chengdu Huang, Brian M. Blum, John A. Sta...
MOBICOM
2003
ACM
15 years 10 months ago
Topology control for wireless sensor networks
We consider a two-tiered Wireless Sensor Network (WSN) consisting of sensor clusters deployed around strategic locations and base-stations (BSs) whose locations are relatively fl...
Jianping Pan, Yiwei Thomas Hou, Lin Cai, Yi Shi, S...
« Prev « First page 3131 / 3554 Last » Next »