Sciweavers

1917 search results - page 228 / 384
» User Model and Utility Based Power Management
Sort
View
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
15 years 10 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
EMSOFT
2005
Springer
15 years 9 months ago
Semantics-based optimization across uncoordinated tasks in networked embedded systems
Microservers are networked embedded devices that accept user tasks on demand and execute them on real world information collected by sensors. Sharing intermediate sensing and comp...
Jie Liu, Elaine Cheong, Feng Zhao
MOBICOM
2010
ACM
15 years 4 months ago
Side channel: bits over interference
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among use...
Kaishun Wu, Haoyu Tan, Yunhuai Liu, Jin Zhang, Qia...
JSW
2007
138views more  JSW 2007»
15 years 4 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
TSP
2010
14 years 11 months ago
Randomized and distributed self-configuration of wireless networks: two-layer Markov random fields and near-optimality
Abstract--This work studies the near-optimality versus the complexity of distributed configuration management for wireless networks. We first develop a global probabilistic graphic...
Sung-eok Jeon, Chuanyi Ji