Sciweavers

5544 search results - page 908 / 1109
» Three Inadequate Models
Sort
View
167
Voted
IEICET
2008
136views more  IEICET 2008»
15 years 3 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
123
Voted
CG
2006
Springer
15 years 3 months ago
Connectivity preserving digitization of blurred binary images in 2D and 3D
Connectivity and neighborhood are fundamental topological properties of objects in pictures. Since the input for any image analysis algorithm is a digital image, which does not ne...
Peer Stelldinger, Ullrich Köthe
115
Voted
CN
2006
126views more  CN 2006»
15 years 3 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
114
Voted
COMPUTER
2006
98views more  COMPUTER 2006»
15 years 3 months ago
Energy-Aware User Interfaces and Energy-Adaptive Displays
The utility of a mobile computer, such as a handheld or a laptop, is largely constrained by battery life. The display stands out as a major consumer of battery energy, so reducing...
Parthasarathy Ranganathan, Erik Geelhoed, Meera Ma...
127
Voted
DATAMINE
2006
157views more  DATAMINE 2006»
15 years 3 months ago
Data Clustering with Partial Supervision
Clustering with partial supervision finds its application in situations where data is neither entirely nor accurately labeled. This paper discusses a semisupervised clustering algo...
Abdelhamid Bouchachia, Witold Pedrycz