Sciweavers

2203 search results - page 390 / 441
» The business of open source
Sort
View
WICOMM
2010
143views more  WICOMM 2010»
13 years 8 months ago
Routing for cognitive radio networks consisting of opportunistic links
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs m...
Kwang-Cheng Chen, Bilge Kartal Cetin, Yu-Cheng Pen...
ICSE
2010
IEEE-ACM
13 years 7 months ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 5 months ago
Design, Implementation and Characterization of a Cooperative Communications System
Cooperative communications is a class of techniques which seek to improve reliability and throughput in wireless systems by pooling the resources of distributed nodes. While coope...
Patrick Murphy, Ashutosh Sabharwal
TIP
2011
217views more  TIP 2011»
13 years 4 months ago
Contextual Object Localization With Multiple Kernel Nearest Neighbor
—Recently, many object localization models have shown that incorporating contextual cues can greatly improve accuracy over using appearance features alone. Therefore, many of the...
Brian McFee, Carolina Galleguillos, Gert R. G. Lan...
CORR
2010
Springer
236views Education» more  CORR 2010»
13 years 4 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...