Sciweavers

170 search results - page 9 / 34
» A Bounding Quantifier
Sort
View
TWC
2010
13 years 2 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...
RTA
1998
Springer
13 years 11 months ago
The Decidability of Simultaneous Rigid E-Unification with One Variable
We show that simultaneous rigid E-unification, or SREU for short, is decidable and in fact EXPTIME-complete in the case of one variable. This result implies that the fragment of i...
Anatoli Degtyarev, Yuri Gurevich, Paliath Narendra...
ICIP
1998
IEEE
14 years 9 months ago
Analysis of the Interpolation Error between Multiresolution Images
Many rendering or image-analysis systems require calculation of versions of an image at lesser resolutions than the original. Because the filtering required to perform such calcul...
Bryan S. Morse
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 7 months ago
Complexity of Data Flow Analysis for Non-Separable Frameworks
The complexity of round robin iterative data flow analysis has been traditionally defined as 1+d where d is the depth of a control flow graph. However, this bound is restricted to ...
Bageshri Karkare, Uday P. Khedker
KDD
2004
ACM
103views Data Mining» more  KDD 2004»
14 years 7 months ago
An objective evaluation criterion for clustering
We propose and test an objective criterion for evaluation of clustering performance: How well does a clustering algorithm run on unlabeled data aid a classification algorithm? The...
Arindam Banerjee, John Langford