Sciweavers

1982 search results - page 153 / 397
» Designing Efficient Distributed Algorithms Using Sampling Te...
Sort
View
176
Voted
FCSC
2007
159views more  FCSC 2007»
15 years 3 months ago
Ranking with uncertain labels and its applications
1 The techniques for image analysis and classi cation generally consider the image sample labels xed and without uncertainties. The rank regression problem is studied in this pape...
Shuicheng Yan, Huan Wang, Jianzhuang Liu, Xiaoou T...
MONET
2006
170views more  MONET 2006»
15 years 3 months ago
Decentralized Utility-based Sensor Network Design
Wireless sensor networks consist of energy-constrained sensor nodes operating unattended in highly dynamic environments. In this paper, we advocate a systematic decentralized appro...
Narayanan Sadagopan, Mitali Singh, Bhaskar Krishna...
SENSYS
2003
ACM
15 years 9 months ago
DFuse: a framework for distributed data fusion
Simple in-network data aggregation (or fusion) techniques for sensor networks have been the focus of several recent research efforts, but they are insufficient to support advance...
Rajnish Kumar, Matthew Wolenetz, Bikash Agarwalla,...
178
Voted
HPCA
2008
IEEE
16 years 4 months ago
System level analysis of fast, per-core DVFS using on-chip switching regulators
Portable, embedded systems place ever-increasing demands on high-performance, low-power microprocessor design. Dynamic voltage and frequency scaling (DVFS) is a well-known techniq...
Wonyoung Kim, Meeta Sharma Gupta, Gu-Yeon Wei, Dav...
TC
1998
15 years 3 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine