Sciweavers

2414 search results - page 470 / 483
» Computing Normal Subgroups
Sort
View
MOBICOM
2010
ACM
13 years 7 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
MOBICOM
2010
ACM
13 years 7 months ago
Indoor localization without the pain
While WiFi-based indoor localization is attractive, the need for a significant degree of pre-deployment effort is a key challenge. In this paper, we ask the question: can we perfo...
Krishna Chintalapudi, Anand Padmanabha Iyer, Venka...
CCS
2010
ACM
13 years 7 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
CIMAGING
2010
165views Hardware» more  CIMAGING 2010»
13 years 7 months ago
Virtual surgical modification for planning tetralogy of Fallot repair
Goals for treating congenital heart defects are becoming increasingly focused on the long-term, targeting solutions that last into adulthood. Although this shift has motivated the...
Jonathan Plasencia, Haithem Babiker, Randy Richard...
AI
2007
Springer
13 years 7 months ago
Learning, detection and representation of multi-agent events in videos
In this paper, we model multi-agent events in terms of a temporally varying sequence of sub-events, and propose a novel approach for learning, detecting and representing events in...
Asaad Hakeem, Mubarak Shah