Sciweavers

458 search results - page 28 / 92
» Perfect Skolem sets
Sort
View
TC
2010
14 years 6 months ago
Performability Analysis of Multistate Computing Systems Using Multivalued Decision Diagrams
A distinct characteristic of multistate systems (MSS) is that the systems and/or their components may exhibit multiple performance levels (or states) varying from perfect operation...
Suprasad V. Amari, Liudong Xing, Akhilesh Shrestha...
TIT
2010
140views Education» more  TIT 2010»
14 years 6 months ago
On the analytic wavelet transform
An exact and general expression for the analytic wavelet transform of a real-valued signal is constructed, resolving the time-dependent effects of non-negligible amplitude and fre...
Jonathan M. Lilly, Sofia C. Olhede
INFOCOM
2011
IEEE
14 years 3 months ago
Spherical representation and polyhedron routing for load balancing in wireless sensor networks
—In this paper we address the problem of scalable and load balanced routing for wireless sensor networks. Motivated by the analog of the continuous setting that geodesic routing ...
Xiaokang Yu, Xiaomeng Ban, Wei Zeng, Rik Sarkar, X...
ICDE
2010
IEEE
204views Database» more  ICDE 2010»
15 years 6 months ago
ProbClean: A probabilistic duplicate detection system
— One of the most prominent data quality problems is the existence of duplicate records. Current data cleaning systems usually produce one clean instance (repair) of the input da...
George Beskales, Mohamed A. Soliman, Ihab F. Ilyas...
IJSN
2006
65views more  IJSN 2006»
14 years 12 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang