Sciweavers

236 search results - page 31 / 48
» adhoc 2005
Sort
View
115
Voted
IMC
2005
ACM
15 years 7 months ago
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage
Interference has always been considered as an unavoidable peril in wireless networks. A single data transmission is useful to some nodes and becomes interference to others. Based ...
Arunesh Mishra, Eric Rozner, Suman Banerjee, Willi...
MADNES
2005
Springer
15 years 7 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
GIS
2005
ACM
16 years 3 months ago
Spatial queries in sensor networks
Recent advances in low-power sensing devices coupled with the widespread availability of wireless ad-hoc networks have fueled the development of sensor networks. These are typical...
Amir Soheili, Vana Kalogeraki, Dimitrios Gunopulos
ICML
2005
IEEE
16 years 2 months ago
Bayesian hierarchical clustering
We present a novel algorithm for agglomerative hierarchical clustering based on evaluating marginal likelihoods of a probabilistic model. This algorithm has several advantages ove...
Katherine A. Heller, Zoubin Ghahramani
POPL
2005
ACM
16 years 2 months ago
Associated types with class
Haskell's type classes allow ad-hoc overloading, or typeindexing, of functions. A natural generalisation is to allow type-indexing of data types as well. It turns out that th...
Manuel M. T. Chakravarty, Gabriele Keller, Simon L...