Sciweavers

11488 search results - page 2092 / 2298
» Robust optimization - methodology and applications
Sort
View
165
Voted
JAPLL
2010
179views more  JAPLL 2010»
15 years 2 months ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...
111
Voted
JPDC
2010
65views more  JPDC 2010»
15 years 2 months ago
Combining shared-coin algorithms
This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence of a strong adversary. By combining shared coins of Brac...
James Aspnes, Hagit Attiya, Keren Censor
114
Voted
JSAC
2010
147views more  JSAC 2010»
15 years 2 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
142
Voted
JSAC
2010
194views more  JSAC 2010»
15 years 2 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
153
Voted
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
15 years 2 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev
« Prev « First page 2092 / 2298 Last » Next »