Sciweavers

13651 search results - page 2619 / 2731
» Spectral analysis of data
Sort
View
150
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
141
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
TCP with adaptive pacing for multihop wireless networks
In this paper, we introduce a novel congestion control algorithm for TCP over multihop IEEE 802.11 wireless networks implementing rate-based scheduling of transmissions within the...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
191
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
16 years 1 months ago
Near-optimal Supervised Feature Selection among Frequent Subgraphs.
Graph classification is an increasingly important step in numerous application domains, such as function prediction of molecules and proteins, computerised scene analysis, and an...
Alexander J. Smola, Arthur Gretton, Hans-Peter Kri...
EUROSYS
2007
ACM
16 years 1 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
« Prev « First page 2619 / 2731 Last » Next »