Sciweavers

12438 search results - page 2187 / 2488
» The Magic of a Number System
Sort
View
GLOBECOM
2010
IEEE
15 years 2 months ago
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
GLOBECOM
2010
IEEE
15 years 2 months ago
Dynamic Resource Allocation Based Partial Crosstalk Cancellation in DSL Networks
The design of crosstalk mitigation techniques for DSL broadband access systems has mainly focused on physical layer transmit rate maximization. However, for certain applications, u...
Beier Li, Paschalis Tsiaflakis, Marc Moonen, Joche...
GLOBECOM
2010
IEEE
15 years 2 months ago
Analysis of Messaging Load in a P2PP Overlay Network under Churn
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Otso Kassinen, Erkki Harjula, Mika Ylianttila
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
15 years 2 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur
ICDM
2010
IEEE
119views Data Mining» more  ICDM 2010»
15 years 2 months ago
Visually Controllable Data Mining Methods
A large number of data mining methods are, as such, not applicable to fast, intuitive, and interactive use. Thus, there is a need for visually controllable data mining methods. Suc...
Kai Puolamäki, Panagiotis Papapetrou, Jefrey ...
« Prev « First page 2187 / 2488 Last » Next »