Sciweavers

1084 search results - page 109 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
MOBICOM
2004
ACM
15 years 9 months ago
Fairness and load balancing in wireless LANs using association control
—The traffic load of wireless LANs is often unevenly distributed among the access points (APs), which results in unfair bandwidth allocation among users. We argue that the load ...
Yigal Bejerano, Seung-Jae Han, Erran L. Li
143
Voted
BMCBI
2010
117views more  BMCBI 2010»
15 years 4 months ago
New decoding algorithms for Hidden Markov Models using distance measures on labellings
Background: Existing hidden Markov model decoding algorithms do not focus on approximately identifying the sequence feature boundaries. Results: We give a set of algorithms to com...
Daniel G. Brown 0001, Jakub Truszkowski
GECCO
2009
Springer
151views Optimization» more  GECCO 2009»
15 years 10 months ago
Swarming to rank for information retrieval
This paper presents an approach to automatically optimize the retrieval quality of ranking functions. Taking a Swarm Intelligence perspective, we present a novel method, SwarmRank...
Ernesto Diaz-Aviles, Wolfgang Nejdl, Lars Schmidt-...
DCOSS
2006
Springer
15 years 7 months ago
Approximation Algorithms for Power-Aware Scheduling of Wireless Sensor Networks with Rate and Duty-Cycle Constraints
We develop algorithms for finding the minimum energy transmission schedule for duty-cycle and rate constrained wireless sensor nodes transmitting over an interference channel. Sinc...
Rajgopal Kannan, Shuangqing Wei
CAISE
1999
Springer
15 years 8 months ago
CPAM, A Protocol for Software Composition
Software composition is critical for building large-scale applications. In this paper, we consider the composition of components that are methods offered by heterogeneous, autonomo...
Laurence Melloul, Dorothea Beringer, Neal Sample, ...