Sciweavers

2960 search results - page 425 / 592
» Learning from Multiple Sources
Sort
View
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
15 years 10 months ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani
152
Voted
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 10 months ago
Power-Aware MAC for MultiHop Wireless Networks: A Cross Layer Approach
— This paper addresses the problem of designing a power-aware Multiple Access Control (MAC) protocol for Multihop Wireless Networks (MHWN). The problem is formulated as a cross l...
Abdorasoul Ghasemi, Karim Faez
133
Voted
ICRA
2005
IEEE
142views Robotics» more  ICRA 2005»
15 years 9 months ago
Correspondenceless Ego-Motion Estimation Using an IMU
Abstract— Mobile robots can be easily equipped with numerous sensors which can aid in the tasks of localization and ego-motion estimation. Two such examples are Inertial Measurem...
Ameesh Makadia, Kostas Daniilidis
103
Voted
IMC
2003
ACM
15 years 8 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
132
Voted
EWMF
2003
Springer
15 years 8 months ago
Mining Web Sites Using Wrapper Induction, Named Entities, and Post-processing
This paper presents a novel method for extracting information from collections of Web pages across different sites. Our method uses a standard wrapper induction algorithm and explo...
Georgios Sigletos, Georgios Paliouras, Constantine...