Sciweavers

12637 search results - page 2453 / 2528
» Security for Extensible Systems
Sort
View
RTSS
2009
IEEE
14 years 2 months ago
Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks
Abstract—Multi-channel design has received significant attention for low-power wireless networks (LWNs), such as 802.15.4-based wireless sensor networks, due to its potential of...
Guoliang Xing, Mo Sha, Jun Huang, Gang Zhou, Xiaor...
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 2 months ago
Rule Ensembles for Multi-target Regression
—Methods for learning decision rules are being successfully applied to many problem domains, especially where understanding and interpretation of the learned model is necessary. ...
Timo Aho, Bernard Zenko, Saso Dzeroski
ICDM
2009
IEEE
233views Data Mining» more  ICDM 2009»
14 years 2 months ago
Semi-Supervised Sequence Labeling with Self-Learned Features
—Typical information extraction (IE) systems can be seen as tasks assigning labels to words in a natural language sequence. The performance is restricted by the availability of l...
Yanjun Qi, Pavel Kuksa, Ronan Collobert, Kunihiko ...
ICPP
2009
IEEE
14 years 2 months ago
SkipStream: A Clustered Skip Graph Based On-demand Streaming Scheme over Ubiquitous Environments
Providing continuous on-demand streaming services with VCR functionality over ubiquitous environments is challenging due to the stringent QoS requirements of streaming service as ...
Qifeng Yu, Tianyin Xu, Baoliu Ye, Sanglu Lu, Daoxu...
INFOCOM
2009
IEEE
14 years 2 months ago
Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule
—This paper considers the design of opportunistic packet schedulers for users sharing a time-varying wireless channel from the performance and the robustness points of view. Firs...
Bilal Sadiq, Seung Jun Baek, Gustavo de Veciana
« Prev « First page 2453 / 2528 Last » Next »