Sciweavers

548 search results - page 104 / 110
» Computation of Shape Through Controlled Active Exploration
Sort
View
TMC
2008
112views more  TMC 2008»
13 years 7 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
GEOINFO
2003
13 years 9 months ago
Modelling Spatial Relations by Generalized Proximity Matrices
One of the main challenges for the development of spatial information theory is the formalization of the concepts of space and spatial relations. Currently, most spatial data struc...
Ana Paula Dutra de Aguiar, Gilberto Câmara, ...
ICDCS
2002
IEEE
14 years 17 days ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
ISORC
2002
IEEE
14 years 16 days ago
Reactive Objects
Object-oriented, concurrent, and event-based programming models provide a natural framework in which to express the behavior of distributed and embedded software systems. However,...
Johan Nordlander, Mark P. Jones, Magnus Carlsson, ...
COMPUTER
2007
117views more  COMPUTER 2007»
13 years 7 months ago
Digital Technology and the Skills Shortage
ract in that they deal with sequences of sound or movement. Two social or personality skills can also be defined: Intrapersonal skill helps people perceive and control their own th...
W. Neville Holmes