Sciweavers

18306 search results - page 3115 / 3662
» Algorithmics in Exponential Time
Sort
View
ICDCS
2005
IEEE
15 years 10 months ago
Resilient Localization for Sensor Networks in Outdoor Environments
The process of computing the physical locations of nodes in a wireless sensor network is known as localization. Selflocalization is critical for large-scale sensor networks becaus...
YoungMin Kwon, Kirill Mechitov, Sameer Sundresh, W...
133
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Bandwidth Clustering for Reliable and Prioritized Network Routing Using Split Agent-Based Method
Recent researches have highlighted the importance of developing a network with distributed problem solving abilities thus enhancing reliability with equal share of network resourc...
Constandinos X. Mavromoustakis, Helen D. Karatza
152
Voted
ICIP
2005
IEEE
15 years 10 months ago
Mining arbitrary-length repeated patterns in television broadcast
Mining repeated patterns in television broadcast is important to advertisers in tracking a large number of television commercials. It can also benefit long-term archival of telev...
Sen-Ching S. Cheung, Thinh Nguyen
ICMCS
2005
IEEE
123views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Nearly Lossless Content-Dependent Low-Power DCT Design for Mobile Video Applications
This paper proposes a practical content-dependent lowpower DCT design with tolerable quality drop. Lowpower issue has become more and more important, especially for portable devic...
Chia-Ping Lin, Po-Chih Tseng, Liang-Gee Chen
ICNP
2005
IEEE
15 years 10 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
« Prev « First page 3115 / 3662 Last » Next »