Sciweavers

2714 search results - page 413 / 543
» Approximation Schemes for Scheduling
Sort
View
118
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Localization Using Radial Basis Function Networks and Signal Strength Fingerprints in WLAN
Abstract—Fingerprinting localization techniques provide reliable location estimates and enable the development of location aware applications especially for indoor environments, ...
Christos Laoudias, Paul Kemppi, Christos G. Panayi...
81
Voted
NSDI
2008
15 years 3 months ago
Centered Discretization with Application to Graphical Passwords
Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of B...
Sonia Chiasson, Jayakumar Srinivasan, Robert Biddl...
107
Voted
DCOSS
2008
Springer
15 years 2 months ago
Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks
We analyze a propagation delay tolerant ALOHA (PDT-ALOHA) protocol proposed recently for underwater networks [16]. In this scheme, guard-bands are introduced at each slot to reduc...
Joon Ahn, Bhaskar Krishnamachari
NIPS
2008
15 years 2 months ago
Multi-Agent Filtering with Infinitely Nested Beliefs
In partially observable worlds with many agents, nested beliefs are formed when agents simultaneously reason about the unknown state of the world and the beliefs of the other agen...
Luke S. Zettlemoyer, Brian Milch, Leslie Pack Kael...
UAI
2008
15 years 2 months ago
Observation Subset Selection as Local Compilation of Performance Profiles
Deciding what to sense is a crucial task, made harder by dependencies and by a nonadditive utility function. We develop approximation algorithms for selecting an optimal set of me...
Yan Radovilsky, Solomon Eyal Shimony