Sciweavers

10066 search results - page 1913 / 2014
» A Technique for Information System Integration
Sort
View
ICC
2009
IEEE
190views Communications» more  ICC 2009»
13 years 6 months ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
ICMLA
2009
13 years 6 months ago
Structured Prediction Models for Chord Transcription of Music Audio
Chord sequences are a compact and useful description of music, representing each beat or measure in terms of a likely distribution over individual notes without specifying the not...
Adrian Weller, Daniel P. W. Ellis, Tony Jebara
ICN
2009
Springer
13 years 6 months ago
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a ...
Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomi...
CJ
2010
193views more  CJ 2010»
13 years 6 months ago
Energy-Efficient Cloud Computing
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 5 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
« Prev « First page 1913 / 2014 Last » Next »