Sciweavers

15073 search results - page 2704 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
137
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
A game approach for multi-channel allocation in multi-hop wireless networks
Channel allocation was extensively investigated in the framework of cellular networks, but it was rarely studied in the wireless ad-hoc networks, especially in the multi-hop ad-ho...
Lin Gao, Xinbing Wang
EWSN
2007
Springer
16 years 3 months ago
Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks
Abstract. A theoretical framework is proposed for accurate performance analysis of minimum energy coding schemes in Coded Division Multiple Access (CDMA) wireless sensor networks. ...
Benigno Zurita Ares, Carlo Fischione, Karl Henrik ...
SDM
2009
SIAM
111views Data Mining» more  SDM 2009»
16 years 1 months ago
A New Constraint for Mining Sets in Sequences.
Discovering interesting patterns in event sequences is a popular task in the field of data mining. Most existing methods try to do this based on some measure of cohesion to deter...
Bart Goethals, Boris Cule, Céline Robardet
SDM
2009
SIAM
205views Data Mining» more  SDM 2009»
16 years 1 months ago
Identifying Information-Rich Subspace Trends in High-Dimensional Data.
Identifying information-rich subsets in high-dimensional spaces and representing them as order revealing patterns (or trends) is an important and challenging research problem in m...
Chandan K. Reddy, Snehal Pokharkar
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
16 years 1 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
« Prev « First page 2704 / 3015 Last » Next »