Sciweavers

2208 search results - page 298 / 442
» Memory Practices in the Sciences
Sort
View
VTC
2008
IEEE
107views Communications» more  VTC 2008»
15 years 4 months ago
Channel Code Division Multiple Access and its Multilevel Structured LDPC Based Instantiation
— In this paper, we introduce and outline the concept of Channel Code Division Multiple Access (CCDMA) using a design example based on the recently proposed Multilevel Structured...
Nicholas Bonello, Rong Zhang, Sheng Chen, Lajos Ha...
ADC
2008
Springer
156views Database» more  ADC 2008»
15 years 4 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang
COLCOM
2007
IEEE
15 years 4 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
COMSWARE
2007
IEEE
15 years 4 months ago
Sensor Network Deployment For Agronomical Data Gathering in Semi-Arid Regions
— We share our experience in planning, designing and deploying a wireless sensor network of one square kilometre area. Environmental data such as soil moisture, temperature, baro...
Tamma V. Prabhakar, N. V. Chalapathi Rao, M. S. Su...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok