Sciweavers

733 search results - page 130 / 147
» Model Reuse through Hardware Design Patterns
Sort
View
KDD
2005
ACM
139views Data Mining» more  KDD 2005»
14 years 27 days ago
Learning to predict train wheel failures
This paper describes a successful but challenging application of data mining in the railway industry. The objective is to optimize maintenance and operation of trains through prog...
Chunsheng Yang, Sylvain Létourneau
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CORR
2010
Springer
195views Education» more  CORR 2010»
13 years 2 months ago
Energy Optimal Transmission Scheduling in Wireless Sensor Networks
One of the main issues in the design of sensor networks is energy efficient communication of time-critical data. Energy wastage can be caused by failed packet transmission attempts...
Rahul Srivastava, Can Emre Koksal

Publication
179views
15 years 5 months ago
Characteristics of Destination Address Locality in Computer Networks: A Comparison of Caching Schemes
The size of computer networks, along with their bandwidths, is growing exponentially. To support these large, high-speed networks, it is neccessary to be able to forward packets in...
R. Jain
CIA
2004
Springer
14 years 24 days ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos