Sciweavers

1852 search results - page 151 / 371
» From Bi-ideals to Periodicity
Sort
View
TMC
2010
104views more  TMC 2010»
13 years 9 months ago
On Nodal Encounter Patterns in Wireless LAN Traces
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
Wei-jen Hsu, Ahmed Helmy
ICDM
2010
IEEE
187views Data Mining» more  ICDM 2010»
13 years 8 months ago
Financial Forecasting with Gompertz Multiple Kernel Learning
Financial forecasting is the basis for budgeting activities and estimating future financing needs. Applying machine learning and data mining models to financial forecasting is both...
Han Qin, Dejing Dou, Yue Fang
INFOCOM
2010
IEEE
13 years 8 months ago
Energy Efficient Algorithms for the RFID Estimation Problem
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...
Tao Li, Samuel Wu, Shigang Chen, Mark Yang
QEST
2010
IEEE
13 years 8 months ago
On the Theory of Stochastic Processors
Traditional architecture design approaches hide hardware uncertainties from the software stack through overdesign, which is often expensive in terms of power consumption. The recen...
Parasara Sridhar Duggirala, Sayan Mitra, Rakesh Ku...
RAID
2010
Springer
13 years 8 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...