Sciweavers

352 search results - page 69 / 71
» The Power of Experience: On the Usefulness of Validation Kno...
Sort
View
DCOSS
2009
Springer
13 years 5 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
BMCBI
2007
111views more  BMCBI 2007»
13 years 7 months ago
CATMA, a comprehensive genome-scale resource for silencing and transcript profiling of Arabidopsis genes
Background: The Complete Arabidopsis Transcript MicroArray (CATMA) initiative combines the efforts of laboratories in eight European countries [1] to deliver gene-specific sequenc...
Gert Sclep, Joke Allemeersch, Robin Liechti, Bj&ou...
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
14 years 2 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
MSWIM
2005
ACM
14 years 27 days ago
Topology control with better radio models: implications for energy and multi-hop interference
Topology Control (TC) is a well-studied technique used in wireless ad hoc networks to find energy-efficient and/or low-interference subgraphs of the maxpower communication graph....
Douglas M. Blough, Mauro Leoncini, Giovanni Resta,...