Sciweavers

1022 search results - page 91 / 205
» Challenges for Constraint Programming in Networking
Sort
View
185
Voted
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 2 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
SIGCOMM
2004
ACM
15 years 6 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
88
Voted
COR
2006
99views more  COR 2006»
15 years 21 days ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...
130
Voted
SASO
2008
IEEE
15 years 7 months ago
Cells Are Plausible Targets for High-Level Spatial Languages
—High level languages greatly increase the power of a programmer at the cost of programs that consume more s than those written at a lower level of abstraction. This inefficienc...
Jacob Beal, Jonathan Bachrach
99
Voted
IFIP
2009
Springer
15 years 7 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras