Sciweavers

5344 search results - page 313 / 1069
» Privacy-Preserving Set Operations
Sort
View
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
15 years 11 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 11 months ago
Design and Evaluation of a Multilevel Decoder for Satellite Communications
—In this paper, we propose a multilevel coding (MLC) scheme suitable for satellite communications, where different QoS levels are required. We introduce a novel characterization ...
Aharon Vargas, Marco Breiling, Wolfgang H. Gerstac...
ICC
2009
IEEE
128views Communications» more  ICC 2009»
15 years 11 months ago
Cost and Target-Based Scheduling for Switch Power Control
—In this paper we propose two advanced algorithms which allow for both differentiated quality-of-service (QOS) and power conservation in input-queued packet switches. These algor...
Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos
ACSC
2008
IEEE
15 years 11 months ago
A model, schema, and interface for metadata file systems
Modern computer systems are based on the traditional hierarchical file system model, but typically contain large numbers of files with complex interrelationships. This tradition...
Stijn Dekeyser, Richard Watson, Lasse Motrø...
ICDM
2008
IEEE
182views Data Mining» more  ICDM 2008»
15 years 11 months ago
Multiple-Instance Regression with Structured Data
We present a multiple-instance regression algorithm that models internal bag structure to identify the items most relevant to the bag labels. Multiple-instance regression (MIR) op...
Kiri L. Wagstaff, Terran Lane, Alex Roper