Sciweavers

1245 search results - page 229 / 249
» Semantic Based Access over XML Data
Sort
View
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
15 years 4 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
ICNP
2007
IEEE
15 years 4 months ago
Scheduled PSM for Minimizing Energy in Wireless LANs
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unschedu...
Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang
VTC
2006
IEEE
142views Communications» more  VTC 2006»
15 years 3 months ago
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs
— Wireless local area networks offer a range of transmitted data rates that are to be selected according to estimated channel conditions. However, due to packet overheads and con...
Sayantan Choudhury, Jerry D. Gibson
IWINAC
2009
Springer
15 years 2 months ago
Results of an Adaboost Approach on Alzheimer's Disease Detection on MRI
Abstract. In this paper we explore the use of the Voxel-based Morphometry (VBM) detection clusters to guide the feature extraction processes for the detection of Alzheimer's d...
Alexandre Savio, Maite García-Sebasti&aacut...
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
15 years 2 months ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti