Sciweavers

10909 search results - page 2163 / 2182
» Evaluating Backup Algorithms
Sort
View
MM
2010
ACM
271views Multimedia» more  MM 2010»
14 years 7 months ago
Large-scale music tag recommendation with explicit multiple attributes
Social tagging can provide rich semantic information for largescale retrieval in music discovery. Such collaborative intelligence, however, also generates a high degree of tags un...
Zhendong Zhao, Xinxi Wang, Qiaoliang Xiang, Andy M...
94
Voted
MOBIHOC
2010
ACM
14 years 7 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
PIMRC
2010
IEEE
14 years 7 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
SECON
2010
IEEE
14 years 7 months ago
Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices
Abstract--Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to impleme...
Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Z...
SECON
2010
IEEE
14 years 7 months ago
Managing TCP Connections in Dynamic Spectrum Access Based Wireless LANs
Wireless LANs have been widely deployed as edge access networks in home/office/commercial buildings, providing connection to the Internet. Therefore, performance of end-toend conne...
Ahwini Kumar, Kang G. Shin
« Prev « First page 2163 / 2182 Last » Next »