Sciweavers

18306 search results - page 3436 / 3662
» Algorithmics in Exponential Time
Sort
View
127
Voted
SDM
2010
SIAM
204views Data Mining» more  SDM 2010»
15 years 3 months ago
Scalable Tensor Factorizations with Missing Data
The problem of missing data is ubiquitous in domains such as biomedical signal processing, network traffic analysis, bibliometrics, social network analysis, chemometrics, computer...
Evrim Acar, Daniel M. Dunlavy, Tamara G. Kolda, Mo...
MVA
2007
211views Computer Vision» more  MVA 2007»
15 years 3 months ago
Vision-based UAV Navigation in Mountain Area
Most vision-based UAV (Unmanned Aerial Vehicle) navigation algorithms extract manmade features such as buildings or roads, which are well structured in urban terrain, using the CC...
Jihwan Woo, Kilho Son, Teng Li, Gwan Sung Kim, In-...
122
Voted
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 3 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
15 years 3 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
114
Voted
WICON
2008
15 years 3 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
« Prev « First page 3436 / 3662 Last » Next »