Sciweavers

558 search results - page 108 / 112
» Safe and Effective Determinant Evaluation
Sort
View
IPSN
2005
Springer
15 years 3 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
MOBICOM
2004
ACM
15 years 3 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...
73
Voted
PKDD
2004
Springer
277views Data Mining» more  PKDD 2004»
15 years 2 months ago
Scalable Density-Based Distributed Clustering
Clustering has become an increasingly important task in analysing huge amounts of data. Traditional applications require that all data has to be located at the site where it is scr...
Eshref Januzaj, Hans-Peter Kriegel, Martin Pfeifle
ISCA
1997
IEEE
135views Hardware» more  ISCA 1997»
15 years 1 months ago
The Design and Analysis of a Cache Architecture for Texture Mapping
The effectiveness of texture mapping in enhancing the realism of computer generated imagery has made support for real-time texture mapping a critical part of graphics pipelines. D...
Ziyad S. Hakura, Anoop Gupta
LCTRTS
2000
Springer
15 years 1 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross