Sciweavers

3070 search results - page 428 / 614
» Making pattern mining useful
Sort
View
ACMSE
2006
ACM
15 years 10 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan
JCDL
2005
ACM
130views Education» more  JCDL 2005»
15 years 10 months ago
Leveraging context to resolve identity in photo albums
Our system suggests likely identity labels for photographs in a personal photo collection. Instead of using face recognition techniques, the system leverages automatically availab...
Mor Naaman, Ron B. Yeh, Hector Garcia-Molina, Andr...
EUC
2005
Springer
15 years 10 months ago
RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers
Abstract. Radio Frequency Identification (RFID) finds use in numerous applications involving item identification and tracking. In a typical application, RFID tags are attached t...
S. Anusha, Sridhar Iyer
NPAR
2004
ACM
15 years 9 months ago
Rendering cracks in Batik
We present an algorithm for simulating the cracks found in Batik wax painting and dyeing technique used to make images on cloth. The algorithm produces cracks similar to those fou...
Brian Wyvill, Cornelius W. A. M. van Overveld, M. ...
115
Voted
VTS
2003
IEEE
95views Hardware» more  VTS 2003»
15 years 9 months ago
Built-In Reseeding for Serial Bist
Reseeding is used to improve fault coverage in pseudo-random testing. Most of the work done on reseeding is based on storing the seeds in an external tester. Besides its high cost...
Ahmad A. Al-Yamani, Edward J. McCluskey