Sciweavers

934 search results - page 156 / 187
» A theoretical analysis of the HIFF problem
Sort
View
ADC
2008
Springer
112views Database» more  ADC 2008»
15 years 4 months ago
Semantics based Buffer Reduction for Queries over XML Data Streams
With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buff...
Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu,...
CEC
2007
IEEE
15 years 4 months ago
Covariance matrix repairing in Gaussian based EDAs
— Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs). In this paper, we analyze continuous EDAs and show that they don’t always work ...
Weishan Dong, Xin Yao
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
A Frequency Diversity Technique for Interference Mitigation in Coexisting Bluetooth and WLAN
— Co-channel interference has become an important problem with the increasing deployment of wireless networks in the unlicensed frequency band. Most existing schemes aim to avoid...
Jingli Li, Xiangqian Liu
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 4 months ago
A Walking Beacon-Assisted Localization in Wireless Sensor Networks
—The localization of the sensor node is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can a...
Bin Xiao, Hekang Chen, Shuigeng Zhou
ICPP
2007
IEEE
15 years 4 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...