Sciweavers

713 search results - page 95 / 143
» Toward a More Reliable Theory of Software Reliability
Sort
View
WSDM
2009
ACM
112views Data Mining» more  WSDM 2009»
15 years 6 months ago
Finding text reuse on the web
With the overwhelming number of reports on similar events originating from different sources on the web, it is often hard, using existing web search paradigms, to find the origi...
Michael Bendersky, W. Bruce Croft
ISLPED
2009
ACM
184views Hardware» more  ISLPED 2009»
15 years 6 months ago
Online work maximization under a peak temperature constraint
Increasing power densities and the high cost of low thermal resistance packages and cooling solutions make it impractical to design processors for worst-case temperature scenarios...
Thidapat Chantem, Xiaobo Sharon Hu, Robert P. Dick
MOBIQUITOUS
2007
IEEE
15 years 6 months ago
On Adjusting Power to Defend Wireless Networks from Jamming
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Wenyuan Xu
ICTAI
2005
IEEE
15 years 5 months ago
ACE: An Aggressive Classifier Ensemble with Error Detection, Correction, and Cleansing
Learning from noisy data is a challenging and reality issue for real-world data mining applications. Common practices include data cleansing, error detection and classifier ensemb...
Yan Zhang, Xingquan Zhu, Xindong Wu, Jeffrey P. Bo...
WSNA
2003
ACM
15 years 5 months ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng