Sciweavers

13376 search results - page 2334 / 2676
» Problem Solving with
Sort
View
JNCA
2011
137views more  JNCA 2011»
14 years 11 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 5 months ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...
IROS
2006
IEEE
151views Robotics» more  IROS 2006»
15 years 10 months ago
Robust Feature Correspondences for Vision-Based Navigation with Slow Frame-Rate Cameras
— We propose a vision-based inertial system that overcomes the problems associated with slow update rates in navigation systems based on high-resolution cameras. Due to bandwidth...
Darius Burschka
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 7 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
ICDCS
2010
IEEE
15 years 5 months ago
Complexity Analysis of Weak Multitolerance
—In this paper, we classify multitolerant systems, i.e., systems that tolerate multiple classes of faults and provide potentially different levels of tolerance to them in terms o...
Jingshu Chen, Sandeep Kulkarni
« Prev « First page 2334 / 2676 Last » Next »