Sciweavers

24529 search results - page 4704 / 4906
» Computing on Authenticated Data
Sort
View
120
Voted
CN
2002
89views more  CN 2002»
15 years 3 months ago
Measurement-based replanning of cell capacities in GSM networks
Due to the scarcity of the spectral resources and mobility of the portables, the call attempts may be blocked during call initiation or terminated during the hand-off process. Whe...
Ertan Onur, Hakan Deliç, Cem Ersoy, M. Ufuk...
149
Voted
CSDA
2007
136views more  CSDA 2007»
15 years 3 months ago
A note on iterative marginal optimization: a simple algorithm for maximum rank correlation estimation
The maximum rank correlation (MRC) estimator was originally studied by Han [1987. Nonparametric analysis of a generalized regression model. J. Econometrics 35, 303–316] and Sher...
Hansheng Wang
137
Voted
JACM
2000
77views more  JACM 2000»
15 years 3 months ago
The fault span of crash failures
A crashing network protocol is an asynchronous protocol whose memory does not survive crashes. We show that a crashing network protocol that works over unreliable links can be driv...
George Varghese, Mahesh Jayaram
114
Voted
GIS
2002
ACM
15 years 3 months ago
Mapping Dilution of Precision (MDOP) and map-matched GPS
A novel method of map matching using the Global Positioning System (GPS) has been developed which uses digital mapping and height data to augment point position computation. This m...
Geoffrey Blewitt, George E. Taylor
146
Voted
COMCOM
1998
83views more  COMCOM 1998»
15 years 3 months ago
System for screening objectionable images
As computers and Internet become more and more available to families, access of objectionable graphics by children is increasingly a problem that many parents are concerned about....
James Ze Wang, Jia Li, Gio Wiederhold, Oscar Firsc...
« Prev « First page 4704 / 4906 Last » Next »