Sciweavers

461 search results - page 58 / 93
» INEX 2005 Evaluation Measures
Sort
View
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 5 months ago
On Map-Matching Vehicle Tracking Data
Vehicle tracking data is an essential “raw” material for a broad range of applications such as traffic management and control, routing, and navigation. An important issue with...
Sotiris Brakatsoulas, Dieter Pfoser, Randall Salas...
VLDB
2005
ACM
115views Database» more  VLDB 2005»
15 years 5 months ago
KLEE: A Framework for Distributed Top-k Query Algorithms
This paper addresses the efficient processing of top-k queries in wide-area distributed data repositories where the index lists for the attribute values (or text terms) of a query...
Sebastian Michel, Peter Triantafillou, Gerhard Wei...
SENSYS
2005
ACM
15 years 5 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...
SIGCOMM
2005
ACM
15 years 5 months ago
On the predictability of large transfer TCP throughput
Predicting the throughput of large TCP transfers is important for a broad class of applications. This paper focuses on the design, empirical evaluation, and analysis of TCP throug...
Qi He, Constantinos Dovrolis, Mostafa H. Ammar
MOBIHOC
2005
ACM
15 years 11 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...