Sciweavers

518 search results - page 69 / 104
» Beating a Random Assignment
Sort
View
132
Voted
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
16 years 2 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
102
Voted
SODA
2010
ACM
157views Algorithms» more  SODA 2010»
15 years 12 months ago
Testing monotone high-dimensional distributions
A monotone distribution P over a (partially) ordered domain assigns higher probability to y than to x if y x in the order. We study several natural problems concerning testing pr...
Ronitt Rubinfeld, Rocco A. Servedio
109
Voted
ISBI
2009
IEEE
15 years 9 months ago
Automated Analysis of Human Protein Atlas Immunofluorescence Images
The Human Protein Atlas is a rich source of location proteomics data. In this work, we present an automated approach for processing and classifying major subcellular patterns in t...
Justin Newberg, Jieyue Li, Arvind Rao, Fredrik Pon...
114
Voted
CSE
2009
IEEE
15 years 9 months ago
A Semantic Imitation Model of Social Tag Choices
—We describe a semantic imitation model of social tagging that integrates formal representations of semantics and a stochastic tag choice process to explain and predict emergent ...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
124
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Greedy Routing with Bounded Stretch
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...