Sciweavers

1056 search results - page 59 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
INFSOF
2008
98views more  INFSOF 2008»
13 years 7 months ago
Engineering contextual knowledge for autonomic pervasive services
Services for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises the problem...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
JSAC
2008
196views more  JSAC 2008»
13 years 7 months ago
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks
Abstract--This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for ...
Affan A. Syed, Wei Ye, John S. Heidemann
SIGIR
2008
ACM
13 years 7 months ago
Improving biomedical document retrieval using domain knowledge
Research articles typically introduce new results or findings and relate them to knowledge entities of immediate relevance. However, a large body of context knowledge related to t...
Shuguang Wang, Milos Hauskrecht
EJWCN
2011
197views more  EJWCN 2011»
13 years 2 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 2 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom