Sciweavers

5948 search results - page 1024 / 1190
» Computing Robust Counter-Strategies
Sort
View
145
Voted
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 9 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
131
Voted
MINENET
2005
ACM
15 years 9 months ago
Topographical proximity for mining network alarm data
Increasingly powerful fault management systems are required to ensure robustness and quality of service in today’s networks. In this context, event correlation is of prime impor...
Ann Devitt, Joseph Duffin, Robert Moloney
121
Voted
MSWIM
2005
ACM
15 years 9 months ago
Trade-offs in bit-rate allocation for wireless video streaming
One of the central problems in video transmission over lossy channels is the choice of source and channel coding rates to allocate the available transmission rate optimally. In th...
Vladimir Vukadinovic, Gunnar Karlsson
124
Voted
SENSYS
2005
ACM
15 years 9 months ago
Algorithms for generic role assignment in wireless sensor networks
We consider configuration of wireless sensor networks, where certain functions must be automatically assigned to sensor nodes, such that the properties of a sensor node (e.g., rem...
Christian Frank, Kay Römer
117
Voted
SENSYS
2005
ACM
15 years 9 months ago
Z-MAC: a hybrid MAC for wireless sensor networks
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA ...
Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min
« Prev « First page 1024 / 1190 Last » Next »