Sciweavers

14936 search results - page 2969 / 2988
» Can They Take It With Them
Sort
View
TMM
2010
194views Management» more  TMM 2010»
13 years 1 months ago
Modeling Flickr Communities Through Probabilistic Topic-Based Analysis
Abstract--With the increased presence of digital imaging devices, there also came an explosion in the amount of multimedia content available online. Users have transformed from pas...
Radu Andrei Negoescu, Daniel Gatica-Perez
TMM
2010
153views Management» more  TMM 2010»
13 years 1 months ago
Optimal Audio Transmission Over Error-Prone Wireless Links
In this paper, we present an optimization framework for transmitting high quality audio sequences over error-prone wireless links. Our framework introduces apparatus and technique ...
Ala F. Khalifeh, Homayoun Yousefi'zadeh
TON
2010
151views more  TON 2010»
13 years 1 months ago
Measurement-Driven Guidelines for 802.11 WLAN Design
Dense deployments of WLANs suffer from increased interference and as a result, reduced capacity. There are three main functions used to improve the overall network capacity: a) in...
Ioannis Broustis, Konstantina Papagiannaki, Srikan...
CORR
2011
Springer
183views Education» more  CORR 2011»
12 years 10 months ago
Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction
For large, real-world inductive learning problems, the number of training examples often must be limited due to the costs associated with procuring, preparing, and storing the tra...
Foster J. Provost, Gary M. Weiss
ICASSP
2011
IEEE
12 years 10 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
« Prev « First page 2969 / 2988 Last » Next »