Sciweavers

894 search results - page 151 / 179
» Game Theory with Costly Computation
Sort
View
ICDCS
2009
IEEE
14 years 4 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
ADHOCNETS
2009
Springer
14 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
COMPGEOM
2009
ACM
14 years 4 months ago
Approximate center points with proofs
We present the Iterated-Tverberg algorithm, the first deterministic algorithm for computing an approximate centerpoint of a set S ∈ Rd with running time sub-exponential in d. T...
Gary L. Miller, Donald Sheehy
ICDM
2006
IEEE
130views Data Mining» more  ICDM 2006»
14 years 3 months ago
Efficient Clustering for Orders
Lists of ordered objects are widely used as representational forms. Such ordered objects include Web search results or best-seller lists. Clustering is a useful data analysis tech...
Toshihiro Kamishima, Shotaro Akaho
DAC
2006
ACM
14 years 3 months ago
Energy-scalable OFDM transmitter design and control
Orthogonal Frequency Division Multiplexing (OFDM) is the modulation of choice for broadband wireless communications. Unfortunately, it comes at the cost of a very low energy effic...
Björn Debaillie, Bruno Bougard, Gregory Lenoi...