Sciweavers

1596 search results - page 250 / 320
» Using knowledge nodes for knowledge discovery and collaborat...
Sort
View
TMC
2008
161views more  TMC 2008»
14 years 9 months ago
A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks
Abstract--In wireless ad hoc networks, in addition to the well-known hidden terminal and exposed terminal problems, the locationdependent contention may cause serious unfairness an...
Ping Wang, Hai Jiang, Weihua Zhuang
CCR
2004
120views more  CCR 2004»
14 years 9 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya
CIKM
2010
Springer
14 years 8 months ago
Domain-independent entity coreference in RDF graphs
In this paper, we present a novel entity coreference algorithm for Semantic Web instances. The key issues include how to locate context information and how to utilize the context ...
Dezhao Song, Jeff Heflin
PERCOM
2010
ACM
14 years 8 months ago
Connectivity monitoring in wireless sensor networks
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
DMIN
2009
222views Data Mining» more  DMIN 2009»
14 years 7 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan