Sciweavers

6833 search results - page 82 / 1367
» Some two-character sets
Sort
View
MOBIHOC
2002
ACM
15 years 11 months ago
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks
We present a series of approximation algorithms for finding a small weakly-connected dominating set (WCDS) in a given graph to be used in clustering mobile ad hoc networks. The st...
Yuanzhu Peter Chen, Arthur L. Liestman
ECRTS
2007
IEEE
15 years 6 months ago
On Dominating Set Allocation Policies in Real-Time Wide-Area Distributed Systems
This paper investigates resource allocation policies for achieving real-time content distribution with subsecond delay bounds on the current Internet. Resource allocation in real-...
Chengdu Huang, Tarek F. Abdelzaher, Xue Liu
ISIPTA
2003
IEEE
120views Mathematics» more  ISIPTA 2003»
15 years 5 months ago
Reliability Analysis in Geotechnics with Finite Elements --- Comparison of Probabilistic, Stochastic and Fuzzy Set Methods
The finite element method is widely used for solving various problems in geotechnical engineering practice. The input parameters required for the calculations are generally impre...
Gerd M. Peschl, H. F. Schweiger
KDD
1997
ACM
143views Data Mining» more  KDD 1997»
15 years 4 months ago
Anytime Exploratory Data Analysis for Massive Data Sets
Exploratory data analysis is inherently an iterative, interactive endeavor. In the context of massive data sets, however, many current data analysis algorithms will not scale appr...
Padhraic Smyth, David Wolpert
SDL
2007
152views Hardware» more  SDL 2007»
15 years 1 months ago
TTCN-3 Quality Engineering: Using Learning Techniques to Evaluate Metric Sets
Software metrics are an essential means to assess software quality. For the assessment of software quality, typically sets of complementing metrics are used since individual metric...
Edith Werner, Jens Grabowski, Helmut Neukirchen, N...