Sciweavers

4429 search results - page 797 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
INFOCOM
2010
IEEE
13 years 7 months ago
Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View
Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
Shanshan Wang, Junshan Zhang, Lang Tong
JCM
2010
126views more  JCM 2010»
13 years 7 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
PERCOM
2010
ACM
13 years 7 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
PUC
2010
114views more  PUC 2010»
13 years 7 months ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...