Sciweavers

193 search results - page 28 / 39
» Ad Hoc Data and the Token Ambiguity Problem
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
IWANN
2005
Springer
14 years 1 months ago
Co-evolutionary Learning in Liquid Architectures
A large class of problems requires real-time processing of complex temporal inputs in real-time. These are difficult tasks for state-of-the-art techniques, since they require captu...
Igal Raichelgauz, Karina Odinaev, Yehoshua Y. Zeev...
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 2 months ago
Data Aggregation and Analysis for Cancer Statistics - A Visual Analytics Approach
The disparity between data collected in rural and urban counties is often detrimental in the appropriate analysis of cancer care statistics. Low counts drastically affect the inci...
Ross Maciejewski, Travis Drake, Stephen Rudolph, A...
PODS
2006
ACM
118views Database» more  PODS 2006»
14 years 7 months ago
Analyzing workflows implied by instance-dependent access rules
Recently proposed form-based web information systems liberate the capture and reuse of data in organizations by substituting the development of technical implementations of electr...
Toon Calders, Stijn Dekeyser, Jan Hidders, Jan Par...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...