Sciweavers

3235 search results - page 29 / 647
» Partial Redundant Modeling
Sort
View
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 10 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
14 years 3 months ago
Thermal-induced leakage power optimization by redundant resource allocation
Traditionally, at early design stages, leakage power is associated with the number of transistors in a design. Hence, intuitively an implementation with minimum resource usage wou...
Min Ni, Seda Ogrenci Memik
AICCSA
2001
IEEE
81views Hardware» more  AICCSA 2001»
14 years 1 months ago
Connectionist Approach for Website Visitors Behaviors Mining
In this paper, we propose a new version of the topological maps algorithm, which has been used to cluster web site visitors. These are characterized by partially redundant variabl...
Khalid Benabdeslem, Younès Bennani, Eric Ja...
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
14 years 4 months ago
An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method
The push method for data transmission in peer-to-peer system has drawn great interest, since it can efficiently reduce the accumulated latency observed at user nodes. However, it ...
Xin Xiao, Yuanchun Shi, Meng Zhang
CCS
2005
ACM
14 years 3 months ago
On the cost-ineffectiveness of redundancy in commercial P2P computing
We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated...
Matthew Yurkewych, Brian Neil Levine, Arnold L. Ro...