Sciweavers

5922 search results - page 1068 / 1185
» Navigability of Complex Networks
Sort
View
118
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 25 days ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2010
Springer
195views Education» more  CORR 2010»
15 years 25 days ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
90
Voted
DEBU
2010
147views more  DEBU 2010»
15 years 25 days ago
Indoor - A New Data Management Frontier
Much research has been conducted on the management of outdoor moving objects. In contrast, relatively little research has been conducted on indoor moving objects. The indoor setti...
Christian S. Jensen, Hua Lu, Bin Yang 0002
DATAMINE
2008
219views more  DATAMINE 2008»
15 years 24 days ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
105
Voted
AUTOMATICA
2006
112views more  AUTOMATICA 2006»
15 years 24 days ago
Joint identification of plant rational models and noise distribution functions using binary-valued observations
System identification of plants with binary-valued output observations is of importance in understanding modeling capability and limitations for systems with limited sensor inform...
Le Yi Wang, Gang George Yin, Ji-Feng Zhang
« Prev « First page 1068 / 1185 Last » Next »