Sciweavers

5962 search results - page 218 / 1193
» Working with Patterns and Code
Sort
View
JNW
2008
101views more  JNW 2008»
15 years 4 months ago
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks
Using two-hop neighborhood information, we present the hybrid activation multiple access (HAMA) protocol for time-division channel access scheduling in ad hoc networks with omni-di...
Lichun Bao, J. J. Garcia-Luna-Aceves
IPPS
2010
IEEE
15 years 2 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...
KDD
2007
ACM
176views Data Mining» more  KDD 2007»
16 years 4 months ago
Mining correlated bursty topic patterns from coordinated text streams
Previous work on text mining has almost exclusively focused on a single stream. However, we often have available multiple text streams indexed by the same set of time points (call...
Xuanhui Wang, ChengXiang Zhai, Xiao Hu, Richard Sp...
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
15 years 11 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...
CVPR
2007
IEEE
15 years 10 months ago
Shape Variation-Based Frieze Pattern for Robust Gait Recognition
Gait is an attractive biometric for vision-based human identification. Previous work on existing public data sets has shown that shape cues yield improved recognition rates compar...
Seungkyu Lee, Yanxi Liu, Robert T. Collins