Sciweavers

1191 search results - page 159 / 239
» Completeness and Performance Of The APO Algorithm
Sort
View
COMCOM
2010
276views more  COMCOM 2010»
14 years 10 months ago
Adjustable convergecast tree protocol for wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure base station receives a complete picture about the monitored area. Convergecast is an important commu...
Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 10 months ago
RDFViewS: A Storage Tuning Wizard for RDF Applications
In recent years, the significant growth of RDF data used in numerous applications has made its efficient and scalable manipulation an important issue. In this paper, we present RD...
François Goasdoué, Konstantinos Kara...
CN
2007
80views more  CN 2007»
14 years 10 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
COMCOM
2007
99views more  COMCOM 2007»
14 years 10 months ago
Topology-aware overlay path probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
Chiping Tang, Philip K. McKinley
CORR
2007
Springer
109views Education» more  CORR 2007»
14 years 10 months ago
Graph rigidity, Cyclic Belief Propagation and Point Pattern Matching
—A recent paper [1] proposed a provably optimal polynomial time method for performing near-isometric point pattern matching by means of exact probabilistic inference in a chordal...
Julian John McAuley, Tibério S. Caetano, Ma...