Sciweavers

4266 search results - page 346 / 854
» The container loading problem
Sort
View
OTM
2009
Springer
15 years 11 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
157
Voted
PKDD
2009
Springer
196views Data Mining» more  PKDD 2009»
15 years 11 months ago
Causality Discovery with Additive Disturbances: An Information-Theoretical Perspective
We consider causally sufficient acyclic causal models in which the relationship among the variables is nonlinear while disturbances have linear effects, and show that three princi...
Kun Zhang, Aapo Hyvärinen
118
Voted
CISS
2008
IEEE
15 years 11 months ago
Multiuser linear precoding for cooperating base stations with asynchronous interference
— This paper addresses multiuser linear precoding using multiple cooperating base stations (BSs). All BSs, and potentially the users, are equipped with multiple antennas. Prior w...
Imad H. Azzam, Raviraj S. Adve
ICC
2008
IEEE
109views Communications» more  ICC 2008»
15 years 11 months ago
An MDP-Based Approach for Multipath Data Transmission over Wireless Networks
—Maintaining performance and reliability in wireless networks is a challenging task due to the nature of wireless channels. Multipath data transmission has been used in wired sce...
Vinh Bui, Weiping Zhu, Alessio Botta, Antonio Pesc...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 11 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa