Sciweavers

1056 search results - page 147 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CORR
2010
Springer
87views Education» more  CORR 2010»
13 years 10 months ago
Publishing and Discovery of Mobile Web Services in Peer to Peer Networks
: It is now feasible to host Web Services on a mobile device due to the advances in cellular devices and mobile communication technologies. However, the reliability, usability and ...
Satish Narayana Srirama
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 10 months ago
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway
Abstract--We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous and local spectrum opportunities without causing unacceptab...
Wei Ren, Qing Zhao, Ananthram Swami
DCG
2008
93views more  DCG 2008»
13 years 10 months ago
Metric Combinatorics of Convex Polyhedra: Cut Loci and Nonoverlapping Unfoldings
Let S be the boundary of a convex polytope of dimension d + 1, or more generally let S be a convex polyhedral pseudomanifold. We prove that S has a polyhedral nonoverlapping unfold...
Ezra Miller, Igor Pak
CVGIP
2006
106views more  CVGIP 2006»
13 years 10 months ago
Precomputing avatar behavior from human motion data
Creating controllable, responsive avatars is an important problem in computer games and virtual environments. Recently, large collections of motion capture data have been exploite...
Jehee Lee, Kang Hoon Lee
ISCI
2008
116views more  ISCI 2008»
13 years 10 months ago
Discovery of maximum length frequent itemsets
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets. In many real-world scenarios, however, it is often ...
Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu