Sciweavers

5864 search results - page 1091 / 1173
» Can We Work around Numerical Methods
Sort
View
134
Voted
LCN
2003
IEEE
15 years 10 months ago
Improving the Aggregate Throughput of Access Points in IEEE 802.11 Wireless LANs
In IEEE 802.11 wireless LANs, the DCF access method and the PCF access method operate alternatively within a superframe to service the time-varying traffic demands. Due to differ...
X. James Dong, Mustafa Ergen, Pravin Varaiya, Anuj...
170
Voted
WSNA
2003
ACM
15 years 10 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li
136
Voted
VLDB
2001
ACM
139views Database» more  VLDB 2001»
15 years 9 months ago
NetCube: A Scalable Tool for Fast Data Mining and Compression
We propose an novel method of computing and storing DataCubes. Our idea is to use Bayesian Networks, which can generate approximate counts for any query combination of attribute v...
Dimitris Margaritis, Christos Faloutsos, Sebastian...
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
15 years 9 months ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
CCS
2006
ACM
15 years 8 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
« Prev « First page 1091 / 1173 Last » Next »