Sciweavers

972 search results - page 59 / 195
» Simulation Using GPSS H
Sort
View
WSDM
2010
ACM
203views Data Mining» more  WSDM 2010»
15 years 7 months ago
Query Reformulation Using Anchor Text
Query reformulation techniques based on query logs have been studied as a method of capturing user intent and improving retrieval effectiveness. The evaluation of these techniques...
Van Dang, Bruce W. Croft
DAGM
2007
Springer
15 years 4 months ago
Semi-supervised Tumor Detection in Magnetic Resonance Spectroscopic Images Using Discriminative Random Fields
Magnetic resonance spectral images provide information on metabolic processes and can thus be used for in vivo tumor diagnosis. However, each single spectrum has to be checked manu...
L. Görlitz, Bjoern H. Menze, M.-A. Weber, B. ...
PERVASIVE
2005
Springer
15 years 3 months ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
MOBIHOC
2004
ACM
15 years 3 months ago
Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standar...
Jungmin So, Nitin H. Vaidya
CIIT
2007
195views Communications» more  CIIT 2007»
14 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...