Sciweavers

949 search results - page 120 / 190
» Theory of Constraints
Sort
View
99
Voted
SIGCOMM
2010
ACM
15 years 25 days ago
Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices
We describe an opportunistic channel access scheme for cognitive radio-enabled secondary nodes (SNs). The proposed scheme uses the residual channel idle time distribution to estim...
Manuj Sharma, Anirudha Sahoo
105
Voted
BIOSYSTEMS
2010
82views more  BIOSYSTEMS 2010»
15 years 22 days ago
A rate distortion approach to protein symmetry
A spontaneous symmetry breaking argument is applied to the problem of protein form, via a Rate Distortion analysis of the relation between genome coding and the final condensation...
Rodrick Wallace
110
Voted
CCR
2010
203views more  CCR 2010»
15 years 22 days ago
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
We present a sophisticated framework to systematically explore the temporal correlation in environmental monitoring wireless sensor networks. The presented framework optimizes los...
Yao Liang, Wei Peng
CAGD
2008
143views more  CAGD 2008»
15 years 22 days ago
A genus oblivious approach to cross parameterization
In this paper we present a robust approach to construct a map between two triangulated meshes, M and M' of arbitrary and possibly unequal genus. We introduce a novel initial ...
Janine Bennett, Valerio Pascucci, Kenneth I. Joy
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 21 days ago
Implementing general belief function framework with a practical codification for low complexity
In this chapter, we propose a new practical codification of the elements of the Venn diagram in order to easily manipulate the focal elements. In order to reduce the complexity, t...
Arnaud Martin