Sciweavers

4870 search results - page 816 / 974
» Construction of Wavelets and Applications
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller
IOT
2010
15 years 2 months ago
A real-time search engine for the Web of Things
The increasing penetration of the real world with embedded and globally networked sensors leads to the formation of the Internet of Things, offering global online access to the cur...
Benedikt Ostermaier, Kay Römer, Friedemann Ma...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
15 years 2 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
ISDA
2010
IEEE
15 years 2 months ago
Comparing SVM ensembles for imbalanced datasets
Real life datasets often suffer from the problem of class imbalance, which thwarts supervised learning process. In such data sets examples of positive (minority) class are signific...
Vasudha Bhatnagar, Manju Bhardwaj, Ashish Mahabal
ISVD
2010
IEEE
15 years 2 months ago
Hydration Shells in Voronoi Tessellations
An interesting property of the Voronoi tessellation is studied in the context of its application to the analysis of hydration shells in computer simulation of solutions. Namely the...
V. P. Voloshin, Alexey V. Anikeenko, Nikolai N. Me...