Sciweavers

2034 search results - page 353 / 407
» Substring Selectivity Estimation
Sort
View
139
Voted
MTA
2006
128views more  MTA 2006»
15 years 2 months ago
Empirical evaluation of the congestion responsiveness of RealPlayer video streams
Increasingly popular commercial streaming media applications over the Internet often use UDP as the underlying transmission protocol for performance reasons. Hand-in-hand with the ...
Jae Chung, Mark Claypool
151
Voted
PERVASIVE
2008
Springer
15 years 2 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
NECO
2006
157views more  NECO 2006»
15 years 2 months ago
Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression
The application of boosting technique to the regression problems has received relatively little attention in contrast to the research aimed at classification problems. This paper ...
Durga L. Shrestha, Dimitri P. Solomatine
107
Voted
RAS
2006
134views more  RAS 2006»
15 years 2 months ago
Simultaneous planning, localization, and mapping in a camera sensor network
In this paper we examine issues of localization, exploration, and planning in the context of a hybrid robot/camera-network system. We exploit the ubiquity of camera networks to us...
Ioannis M. Rekleitis, David Meger, Gregory Dudek
IJNSEC
2007
144views more  IJNSEC 2007»
15 years 2 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh