Sciweavers

3820 search results - page 443 / 764
» Bounded Model Debugging
Sort
View
ICNP
2009
IEEE
15 years 10 months ago
oCast: Optimal Multicast Routing Protocol for Wireless Sensor Networks
—In this paper, we describe oCast, an energy-optimal multicast routing protocol for wireless sensor networks. The general minimum-energy multicast problem is NP-hard. Intermitten...
Lu Su, Bolin Ding, Yong Yang, Tarek F. Abdelzaher,...
IPPS
2009
IEEE
15 years 10 months ago
Competitive buffer management with packet dependencies
We introduce the problem of managing a FIFO buffer of bounded space, where arriving packets have dependencies among them. Our model is motivated by the scenario where large data f...
Alexander Kesselman, Boaz Patt-Shamir, Gabriel Sca...
ISAAC
2009
Springer
175views Algorithms» more  ISAAC 2009»
15 years 10 months ago
Worst-Case and Smoothed Analysis of k-Means Clustering with Bregman Divergences
The k-means algorithm is the method of choice for clustering large-scale data sets and it performs exceedingly well in practice. Most of the theoretical work is restricted to the c...
Bodo Manthey, Heiko Röglin
SSD
2009
Springer
141views Database» more  SSD 2009»
15 years 10 months ago
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, howev...
Kar Way Tan, Yimin Lin, Kyriakos Mouratidis
130
Voted
WCNC
2008
IEEE
15 years 10 months ago
A Novel Capacity Analysis for Wireless Backhaul Mesh Networks
—This paper presents a novel ring-based approach to analyze the inter-flow capacity of a backhaul wireless mesh networks (WMNs) with centralized scheduling. Based on the property...
Tein-Yaw D. Chung, Kuan-Chun Lee, Hsiao-Chih Georg...