Sciweavers

2007 search results - page 282 / 402
» MUC-3 evaluation metrics
Sort
View
ICAPR
2005
Springer
14 years 3 months ago
Recognition Tasks Are Imitation Games
There is need for more formal specification of recognition tasks. Currently, it is common to use labeled training samples to illustrate the task to be performed. The mathematical ...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
ICCSA
2005
Springer
14 years 3 months ago
A Novel Hierarchical Routing Protocol for Wireless Sensor Networks
Abstract. In this paper, we propose a novel hierarchical routing protocol for a large wireless sensor network (WSN) wherein sensors are arranged into a multi-layer architecture wit...
Trong Thua Huynh, Choong Seon Hong
ISCIS
2005
Springer
14 years 3 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy
ISPEC
2005
Springer
14 years 3 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
STACS
2005
Springer
14 years 3 months ago
Cycle Cover with Short Cycles
Cycle covering is a well-studied problem in computer science. In this paper, we develop approximation algorithms for variants of cycle covering problems which bound the size and/o...
Nicole Immorlica, Mohammad Mahdian, Vahab S. Mirro...