Sciweavers

1016 search results - page 16 / 204
» Explore or Exploit
Sort
View
SIGMOBILE
2008
72views more  SIGMOBILE 2008»
13 years 7 months ago
RFID-based networks: exploiting diversity and redundancy
In this article, we outline a research agenda for developing protocols and algorithms for densely populated RFID based systems covering a wide geographic area. This will need mult...
Nitin Vaidya, Samir R. Das
ICDM
2007
IEEE
162views Data Mining» more  ICDM 2007»
13 years 11 months ago
Exploiting Network Structure for Active Inference in Collective Classification
Active inference seeks to maximize classification performance while minimizing the amount of data that must be labeled ex ante. This task is particularly relevant in the context o...
Matthew J. Rattigan, Marc Maier, David Jensen, Bin...
ERSA
2006
119views Hardware» more  ERSA 2006»
13 years 9 months ago
Exploiting Hierarchical Configuration to Improve Run-Time MPSoC Task Assignment
Run-time assignment of a set of communicating tasks onto a heterogeneous multiprocessor system-on-chip (MPSoC) platform is a challenging task. Having FPGA fabric tiles in such MPS...
Vincent Nollet, Prabhat Avasare, Diederik Verkest,...
NDSS
2008
IEEE
14 years 2 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
14 years 2 months ago
Exploiting the Information at the Loop Closure in SLAM
— This paper presents two methods able to exploit the information at the loop closure in the SLAM problem. Both methods have three fundamental advantages. The first one is that ...
Agostino Martinelli, Roland Siegwart