Sciweavers

1456 search results - page 202 / 292
» Improved Randomized Results for That Interval Selection Prob...
Sort
View
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
15 years 10 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 7 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
86
Voted
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 5 months ago
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICPPW
2007
IEEE
15 years 4 months ago
A Measurement of a large-scale Peer-to-Peer Live Video Streaming System
— Peer-to-Peer (P2P) technologies have found much success in applications like file distributions, and its adoption in live video streaming has recently attracted significant a...
Susu Xie, Gabriel Yik Keung, Bo Li
ILP
2004
Springer
15 years 3 months ago
Learning Ensembles of First-Order Clauses for Recall-Precision Curves: A Case Study in Biomedical Information Extraction
Many domains in the field of Inductive Logic Programming (ILP) involve highly unbalanced data. Our research has focused on Information Extraction (IE), a task that typically invol...
Mark Goadrich, Louis Oliphant, Jude W. Shavlik