Sciweavers

2642 search results - page 381 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
COMCOM
2008
143views more  COMCOM 2008»
13 years 9 months ago
Cross-layer rate control, medium access control and routing design in cooperative VANET
In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-laye...
Liang Zhou, Baoyu Zheng, Benoit Geller, Anne Wei, ...
JCP
2006
85views more  JCP 2006»
13 years 9 months ago
A Constructive Meta-Level Feature Selection Method based on Method Repositories
Feature selection is one of key issues related with data pre-processing of classification task in a data mining process. Although many efforts have been done to improve typical fea...
Hidenao Abe, Takahira Yamaguchi
FUIN
2000
68views more  FUIN 2000»
13 years 9 months ago
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
We consider the problem of dependable computation with multiple inputs. The goal is to study when redundancy can help to achieve survivability and when it cannot. We use AND/OR gra...
Yongge Wang, Yvo Desmedt, Mike Burmester
GEOINFORMATICA
1998
144views more  GEOINFORMATICA 1998»
13 years 9 months ago
Approximation-Based Similarity Search for 3-D Surface Segments
The issue of ®nding similar 3-D surface segments arises in many recent applications of spatial database systems, such as molecular biology, medical imaging, CAD, and geographic i...
Hans-Peter Kriegel, Thomas Seidl
CLUSTER
1999
IEEE
13 years 9 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz