Sciweavers

641 search results - page 104 / 129
» Performance and Effectiveness Analysis of Checkpointing in M...
Sort
View
IJCNN
2000
IEEE
15 years 3 months ago
Pose Classification Using Support Vector Machines
The field of human-computer interaction has been widely investigated in the last years, resulting in a variety of systems used in different application fields like virtual reality...
Edoardo Ardizzone, Antonio Chella, Roberto Pirrone
ICALP
2009
Springer
16 years 1 days ago
Rumor Spreading in Social Networks
Social networks are an interesting class of graphs likely to become of increasing importance in the future, not only theoretically, but also for its probable applications to ad hoc...
Flavio Chierichetti, Silvio Lattanzi, Alessandro P...
WCNC
2008
IEEE
15 years 6 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
BDA
2003
15 years 1 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
MOBISYS
2009
ACM
16 years 9 days ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...