Sciweavers

657 search results - page 77 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
ECIR
2008
Springer
14 years 11 months ago
A Statistical View of Binned Retrieval Models
Many traditional information retrieval models, such as BM25 and language modeling, give good retrieval effectiveness, but can be difficult to implement efficiently. Recently, docum...
Donald Metzler, Trevor Strohman, W. Bruce Croft
PSTV
1992
113views Hardware» more  PSTV 1992»
14 years 11 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
ADHOC
2006
100views more  ADHOC 2006»
14 years 9 months ago
Radio range adjustment for energy efficient wireless sensor networks
In wireless ad hoc sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. Topology management schemes su...
Quang Gao, Keith J. Blow, David J. Holding, Ian W....
COMPGEOM
2006
ACM
15 years 3 months ago
Algorithms for two-box covering
We study the problem of covering a set of points or polyhedra in 3 with two axis-aligned boxes in order to minimize a function of the measures of the two boxes, such as the sum or...
Esther M. Arkin, Gill Barequet, Joseph S. B. Mitch...
ICDCS
2010
IEEE
14 years 11 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu