Sciweavers

850 search results - page 83 / 170
» heuristics 2006
Sort
View
112
Voted
LCN
2006
IEEE
15 years 6 months ago
Protecting Multicast Sessions in Wireless Mesh Networks
To support reliable multicast routing in wireless mesh networks, it is important to protect multicast sessions against link or node failures. The issue of protecting multicast ses...
Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha
86
Voted
ASPLOS
2006
ACM
15 years 6 months ago
A spatial path scheduling algorithm for EDGE architectures
Growing on-chip wire delays are motivating architectural features that expose on-chip communication to the compiler. EDGE architectures are one example of communication-exposed mi...
Katherine E. Coons, Xia Chen, Doug Burger, Kathryn...
74
Voted
ICDM
2006
IEEE
86views Data Mining» more  ICDM 2006»
15 years 6 months ago
Turning Clusters into Patterns: Rectangle-Based Discriminative Data Description
The ultimate goal of data mining is to extract knowledge from massive data. Knowledge is ideally represented as human-comprehensible patterns from which end-users can gain intuiti...
Byron J. Gao, Martin Ester
ICDM
2006
IEEE
182views Data Mining» more  ICDM 2006»
15 years 6 months ago
Active Learning to Maximize Area Under the ROC Curve
In active learning, a machine learning algorithm is given an unlabeled set of examples U, and is allowed to request labels for a relatively small subset of U to use for training. ...
Matt Culver, Kun Deng, Stephen D. Scott
GLOBECOM
2006
IEEE
15 years 6 months ago
A Simple Congestion-Resilient Link Adaptation Algorithm for IEEE 802.11 WLANs
— Algorithmic approach to link adaptation for IEEE 802.11 networks such as Automatic Rate Fallback (ARF) is known to suffer from the inability to differentiate between collision ...
Hyogon Kim, Sangki Yun, Heejo Lee, Inhye Kang, Kyu...