Sciweavers

2131 search results - page 387 / 427
» Immunity for Closed Sets
Sort
View
INFOCOM
2002
IEEE
15 years 4 months ago
Downlink Power Allocation for Multi-class CDMA Wireless Networks
Abstract—In this paper we consider the downlink power allocation problem for multi-class CDMA wireless networks. We use a utility based power allocation framework to treat multi-...
Jangwon Lee, Ravi Mazumdar, Ness B. Shroff
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
15 years 4 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
EDCC
2010
Springer
15 years 4 months ago
D2HT: The Best of Both Worlds, Integrating RPS and DHT
Distributed Hash Tables (DHTs) and Random Peer Sampling (RPS) provide important and complementary services in the area of P2P overlay networks. DHTs achieve efficient lookup whil...
Marin Bertier, François Bonnet, Anne-Marie ...
EMSOFT
2009
Springer
15 years 4 months ago
Serving embedded content via web applications: model, design and experimentation
Embedded systems such as smart cards or sensors are now widespread, but are often closed systems, only accessed via dedicated terminals. A new trend consists in embedding Web serv...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
AAECC
2001
Springer
132views Algorithms» more  AAECC 2001»
15 years 4 months ago
Duality and Greedy Weights of Linear Codes and Projective Multisets
A projective multiset is a collection of projective points, which are not necessarily distinct. A linear code can be represented as a projective multiset, by taking the columns of ...
Hans Georg Schaathun