Sciweavers

2539 search results - page 316 / 508
» Debugging Method Names
Sort
View
COMCOM
2007
124views more  COMCOM 2007»
15 years 2 months ago
Path planning of mobile landmarks for localization in wireless sensor networks
Many applications of wireless sensor networks require the sensor nodes to obtain their locations. The main idea in most localization methods has been that some nodes with known co...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
JCST
2008
138views more  JCST 2008»
15 years 2 months ago
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
In Chinese, phrases and named entities play a central role in information retrieval. Abbreviations, however, make keyword-based approaches less effective. This paper presents an em...
Xu Sun, Houfeng Wang, Bo Wang 0003
111
Voted
JSAC
2008
167views more  JSAC 2008»
15 years 2 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
129
Voted
PAMI
2006
206views more  PAMI 2006»
15 years 2 months ago
MILES: Multiple-Instance Learning via Embedded Instance Selection
Multiple-instance problems arise from the situations where training class labels are attached to sets of samples (named bags), instead of individual samples within each bag (called...
Yixin Chen, Jinbo Bi, James Ze Wang
127
Voted
TCS
2008
15 years 2 months ago
On the complexity of real root isolation using continued fractions
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algeb...
Elias P. Tsigaridas, Ioannis Z. Emiris