Sciweavers

16843 search results - page 3304 / 3369
» On Generalized Authorization Problems
Sort
View
99
Voted
JC
2008
128views more  JC 2008»
15 years 19 days ago
Lattice rule algorithms for multivariate approximation in the average case setting
We study multivariate approximation for continuous functions in the average case setting. The space of d variate continuous functions is equipped with the zero mean Gaussian measu...
Frances Y. Kuo, Ian H. Sloan, Henryk Wozniakowski
105
Voted
JCIT
2008
138views more  JCIT 2008»
15 years 19 days ago
Enhancing the Routing Performance of Wireless Sensor Networks using Connected Dominating Sets
Many prominent applications in wireless sensor networks require collected information has to be routed to end nodes in an efficient manner. In general, Connected Dominating Set (C...
B. Paramasivan, Mohaideen Pitchai, Radha Krishnan
93
Voted
CORR
2007
Springer
151views Education» more  CORR 2007»
15 years 19 days ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
139
Voted
JCST
2008
175views more  JCST 2008»
15 years 19 days ago
Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows
Detecting duplicates in data streams is an important problem that has a wide range of applications. In general, precisely detecting duplicates in an unbounded data stream is not fe...
Hong Shen, Yu Zhang
CORR
2007
Springer
97views Education» more  CORR 2007»
15 years 19 days ago
Side-information Scalable Source Coding
Abstract—We consider the problem of side-information scalable (SI-scalable) source coding, where the encoder constructs a two-layer description, such that the receiver with high ...
Chao Tian, Suhas N. Diggavi
« Prev « First page 3304 / 3369 Last » Next »