Sciweavers

4438 search results - page 862 / 888
» On the Distribution of Keys by Hashing
Sort
View
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 8 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...
CORR
2010
Springer
248views Education» more  CORR 2010»
13 years 8 months ago
Optimal Spectrum Sharing in MIMO Cognitive Radio Networks via Semidefinite Programming
Abstract--In cognitive radio (CR) networks with multipleinput multiple-output (MIMO) links, secondary users (SUs) can exploit "spectrum holes" in the space domain to acce...
Ying Jun Zhang, Anthony Man-Cho So
COR
2008
116views more  COR 2008»
13 years 8 months ago
Supply disruptions with time-dependent parameters
We consider a firm that faces random demand and receives product from a single supplier who faces random supply. The supplier's availability may be affected by events such as...
Andrew M. Ross, Ying Rong, Lawrence V. Snyder
CVIU
2010
429views more  CVIU 2010»
13 years 8 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
DEBU
2008
149views more  DEBU 2008»
13 years 8 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu