Sciweavers

397 search results - page 71 / 80
» Comparing Two Grammar-Based Generation Algorithms: A Case St...
Sort
View
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
14 years 1 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
ICDM
2002
IEEE
145views Data Mining» more  ICDM 2002»
14 years 18 days ago
Mining Top-K Frequent Closed Patterns without Minimum Support
In this paper, we propose a new mining task: mining top-k frequent closed patterns of length no less than min , where k is the desired number of frequent closed patterns to be min...
Jiawei Han, Jianyong Wang, Ying Lu, Petre Tzvetkov
CDC
2009
IEEE
148views Control Systems» more  CDC 2009»
14 years 11 days ago
Comparison of reduced order lithium-ion battery models for control applications
— Lithium-ion batteries are the core of new plug-in hybrid-electrical vehicles (PHEV) as well as considered in many 2nd generation hybrid electric vehicles (HEV). In most cases t...
Carmelo Speltino, Domenico Di Domenico, Giovanni F...
TON
2008
139views more  TON 2008»
13 years 7 months ago
Stochastic learning solution for distributed discrete power control game in wireless data networks
Distributed power control is an important issue in wireless networks. Recently, noncooperative game theory has been applied to investigate interesting solutions to this problem. Th...
Yiping Xing, Rajarathnam Chandramouli
TWC
2010
13 years 2 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali