Sciweavers

11384 search results - page 2219 / 2277
» Achieved IPC Performance
Sort
View
JSAC
2008
140views more  JSAC 2008»
13 years 10 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
JSAC
2008
79views more  JSAC 2008»
13 years 10 months ago
A content-centric framework for effective data dissemination in opportunistic networks
In this paper, we address the challenges of content transfer in opportunistic networks, and propose techniques to better facilitate data dissemination based on the characteristics ...
Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao...
JSAC
2008
151views more  JSAC 2008»
13 years 10 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
JCST
2006
99views more  JCST 2006»
13 years 10 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
JMLR
2006
132views more  JMLR 2006»
13 years 10 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 2219 / 2277 Last » Next »