Sciweavers

17951 search results - page 3399 / 3591
» Network Coding Applications
Sort
View
119
Voted
SIGKDD
2008
149views more  SIGKDD 2008»
15 years 2 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
SIGMETRICS
2008
ACM
109views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Automatic request categorization in internet services
Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirem...
Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhur...
147
Voted
AC
2005
Springer
15 years 2 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
136
Voted
TASLP
2008
115views more  TASLP 2008»
15 years 2 months ago
Recognition of Dialogue Acts in Multiparty Meetings Using a Switching DBN
Abstract--This paper is concerned with the automatic recognition of dialogue acts (DAs) in multiparty conversational speech. We present a joint generative model for DA recognition ...
Alfred Dielmann, Steve Renals
140
Voted
TCS
2008
15 years 2 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
« Prev « First page 3399 / 3591 Last » Next »