Sciweavers

6506 search results - page 1058 / 1302
» Algorithmic models for sensor networks
Sort
View
127
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry
131
Voted
IWANN
2007
Springer
15 years 9 months ago
Speeding Up the Dissimilarity Self-Organizing Maps by Branch and Bound
Abstract. This paper proposes to apply the branch and bound principle from combinatorial optimization to the Dissimilarity Self-Organizing Map (DSOM), a variant of the SOM that can...
Brieuc Conan-Guez, Fabrice Rossi
125
Voted
ICA
2004
Springer
15 years 9 months ago
Post-nonlinear Independent Component Analysis by Variational Bayesian Learning
Post-nonlinear (PNL) independent component analysis (ICA) is a generalisation of ICA where the observations are assumed to have been generated from independent sources by linear mi...
Alexander Ilin, Antti Honkela
123
Voted
SAINT
2003
IEEE
15 years 8 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
142
Voted
WIMOB
2008
IEEE
15 years 10 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
« Prev « First page 1058 / 1302 Last » Next »