Sciweavers

251 search results - page 13 / 51
» The main name system: an exercise in centralized computing
Sort
View
MOBIHOC
2002
ACM
14 years 7 months ago
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks
We present a series of approximation algorithms for finding a small weakly-connected dominating set (WCDS) in a given graph to be used in clustering mobile ad hoc networks. The st...
Yuanzhu Peter Chen, Arthur L. Liestman
CDC
2008
IEEE
112views Control Systems» more  CDC 2008»
13 years 9 months ago
Information fusion strategies from distributed filters in packet-drop networks
Abstract-- In this paper we study different distributed estimation schemes for stochastic discrete time linear systems where the communication between the sensors and the estimatio...
Alessandro Chiuso, Luca Schenato
PODS
2006
ACM
137views Database» more  PODS 2006»
14 years 7 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Cooperative Automated Worm Response and Detection Immune Algorithm
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these ...
Jungwon Kim, William O. Wilson, Uwe Aickelin, Juli...
ICPR
2002
IEEE
14 years 8 months ago
Improving Face Verification Using Skin Color Information
The performance of face verification systems has steadily improved over the last few years, mainly focusing on models rather than on feature processing. State-of-the-art methods o...
Sébastien Marcel, Samy Bengio