Sciweavers

1576 search results - page 208 / 316
» Streaming Algorithms for Independent Sets
Sort
View
CCE
2007
15 years 4 months ago
An agent-based approach for supply chain retrofitting under uncertainty
In this work, decisions that have a long lasting effect on the SC such as the design and retrofit of a production/distribution network are considered. The retrofitting tasks are a...
Fernando D. Mele, Gonzalo Guillén, Antonio ...
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 4 months ago
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes f...
Adnan Vora, Mikhail Nesterenko, Sébastien T...

Presentation
945views
13 years 10 months ago
A Decentralized Method for Maximizing k-coverage Lifetime in WSNs
In this paper, we propose a decentralized method for maximizing lifetime of data collection wireless sensor networks (WSNs) by making minimal number of nodes operate and putting ot...
138
Voted
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
16 years 5 months ago
Learning subspace kernels for classification
Kernel methods have been applied successfully in many data mining tasks. Subspace kernel learning was recently proposed to discover an effective low-dimensional subspace of a kern...
Jianhui Chen, Shuiwang Ji, Betul Ceran, Qi Li, Min...
152
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...
Qing Chen, Fei Ye, Zhisheng Niu