Sciweavers

4698 search results - page 295 / 940
» Making Functionality More General
Sort
View
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 5 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
16 years 4 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
ICCAD
2002
IEEE
107views Hardware» more  ICCAD 2002»
16 years 1 months ago
Theoretical and practical validation of combined BEM/FEM substrate resistance modeling
In mixed-signal designs, substrate noise originating from the digital part can seriously influence the functionality of the analog part. As such, accurately modeling the properti...
Eelco Schrik, Patrick Dewilde, N. P. van der Meijs
GLOBECOM
2008
IEEE
15 years 11 months ago
On the Statistics and MAC Implications of Channel Estimation Errors in MIMO Ad Hoc Networks
—In this paper, we propose an analytical technique to evaluate the statistics of the channel estimation error in a simple multi-user ad hoc networking scenario. This problem is v...
Davide Chiarotto, Paolo Casari, Michele Zorzi
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 11 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour