Sciweavers

1254 search results - page 239 / 251
» Making Hard Problems Harder
Sort
View
COMPSAC
2005
IEEE
14 years 1 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
MM
2005
ACM
122views Multimedia» more  MM 2005»
14 years 1 months ago
Image clustering with tensor representation
We consider the problem of image representation and clustering. Traditionally, an n1 × n2 image is represented by a vector in the Euclidean space Rn1×n2 . Some learning algorith...
Xiaofei He, Deng Cai, Haifeng Liu, Jiawei Han
MOBICOM
2005
ACM
14 years 1 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
MSWIM
2005
ACM
14 years 1 months ago
Content and service replication strategies in multi-hop wireless mesh networks
Emerging multi-hop wireless mesh networks have much different characteristics than the Internet. They have low dimensionality and large diameters. Content and service replication ...
Shudong Jin, Limin Wang
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...