Sciweavers

22193 search results - page 4195 / 4439
» Multiple Restricted Multiplication
Sort
View
272
Voted
AICCSA
2008
IEEE
216views Hardware» more  AICCSA 2008»
15 years 3 months ago
Mining fault tolerant frequent patterns using pattern growth approach
Mining fault tolerant (FT) frequent patterns from transactional datasets are very complex than mining all frequent patterns (itemsets), in terms of both search space exploration a...
Shariq Bashir, Zahid Halim, Abdul Rauf Baig
AAI
2010
108views more  AAI 2010»
15 years 3 months ago
Augmenting Subsumption Propagation in Distributed Description Logics
Distributed Description Logics (DDL) enable reasoning with multiple ontologies interconnected by directional semantic mapping, called bridge rules. Bridge rules map concepts of a s...
Martin Homola, Luciano Serafini
117
Voted
ADT
2008
15 years 3 months ago
A service-oriented admission control strategy for class-based IP networks
The clear trend toward the integration of current and emerging applications and services in the Internet launches new demands on service deployment and management. Distributed serv...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
148
Voted
ADHOC
2007
135views more  ADHOC 2007»
15 years 3 months ago
Mitigating the gateway bottleneck via transparent cooperative caching in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and robust Internet access. The dominant Internet-access traffic from clients causes a congest...
Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
159
Voted
AHSWN
2008
163views more  AHSWN 2008»
15 years 3 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
« Prev « First page 4195 / 4439 Last » Next »