Sciweavers

2925 search results - page 522 / 585
» Information Complexity of Online Problems
Sort
View
TMC
2010
152views more  TMC 2010»
13 years 8 months ago
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
—Location and intersensor distance estimations are important functions for the operation of wireless sensor networks, especially when protocols can benefit from the distance info...
Serdar Vural, Eylem Ekici
IPPS
2010
IEEE
13 years 8 months ago
Using focused regression for accurate time-constrained scaling of scientific applications
Many large-scale clusters now have hundreds of thousands of processors, and processor counts will be over one million within a few years. Computational scientists must scale their ...
Bradley J. Barnes, Jeonifer Garren, David K. Lowen...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
13 years 7 months ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
13 years 7 months ago
Ensemble-Vis: A Framework for the Statistical Visualization of Ensemble Data
Scientists increasingly use ensemble data sets to explore relationships present in dynamic systems. Ensemble data sets combine spatio-temporal simulation results generated using mu...
Kristin Potter, Andrew Wilson, Peer-Timo Bremer, D...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea