Sciweavers

183 search results - page 28 / 37
» Measuring and modeling anisotropic reflection
Sort
View
85
Voted
WWW
2008
ACM
16 years 1 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
CBMS
2006
IEEE
15 years 6 months ago
Technology for Medical Education, Research, and Disease Screening by Exploitation of Biomarkers in a Large Collection of Uterine
The Communications Engineering Branch of the National Library of Medicine is collaborating with the National Cancer Institute (NCI) in developing applications for medical educatio...
L. Rodney Long, Sameer Antani, Jose Jeronimo, Mark...
85
Voted
SIGOPSE
2004
ACM
15 years 5 months ago
An approach to benchmarking configuration complexity
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity o...
Aaron B. Brown, Joseph L. Hellerstein
AAAI
2000
15 years 1 months ago
Redundancy in Random SAT Formulas
The random k-SAT model is extensively used to compare satisfiability algorithms or to find the best settings for the parameters of some algorithm. Conclusions are derived from the...
Yacine Boufkhad, Olivier Roussel
99
Voted
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
14 years 7 months ago
Optimal cross-layer wireless control policies using TD learning
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
Sean P. Meyn, Wei Chen, Daniel O'Neill