Sciweavers

641 search results - page 114 / 129
» On robust online scheduling algorithms
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
ICC
2007
IEEE
14 years 2 months ago
Trade-Offs of Spatial Gain for QoS-Guaranteed Services in the MIMO Broadcast Channels
— Although the capacity of multiple-input multiple output (MIMO) broadcast channels (BCs) can be achieved by dirty-paper coding (DPC), it is difficult to apply the results direct...
Seung Hwan Lee, John S. Thompson
JSAC
2008
79views more  JSAC 2008»
13 years 7 months ago
A content-centric framework for effective data dissemination in opportunistic networks
In this paper, we address the challenges of content transfer in opportunistic networks, and propose techniques to better facilitate data dissemination based on the characteristics ...
Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao...
ICIP
2007
IEEE
14 years 9 months ago
Mining Auxiliary Objects for Tracking by Multibody Grouping
On-line discovery of some auxiliary objects to verify the tracking results is a novel approach to achieving robust tracking by balancing the need for strong verification and compu...
Ming Yang, Ying Wu, Shihong Lao
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 8 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng