Sciweavers

1898 search results - page 244 / 380
» Weak Keys for IDEA
Sort
View
COMSWARE
2007
IEEE
14 years 4 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
DASFAA
2007
IEEE
220views Database» more  DASFAA 2007»
14 years 4 months ago
LAPIN: Effective Sequential Pattern Mining Algorithms by Last Position Induction for Dense Databases
Sequential pattern mining is very important because it is the basis of many applications. Although there has been a great deal of effort on sequential pattern mining in recent year...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa
EUROMICRO
2007
IEEE
14 years 4 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
GLOBECOM
2007
IEEE
14 years 4 months ago
On the Design of Future Wireless Ad Hoc Networks
— In this paper, we study the design of future wireless ad hoc networks. Particularly, we consider that the future wireless ad hoc networks shall be able to efficiently provide ...
Kejie Lu, Shengli Fu, Tao Zhang, Yi Qian
GLOBECOM
2007
IEEE
14 years 4 months ago
Probabilistic-Based Rate Adaptation for IEEE 802.11 WLANs
— Collision awareness has been recognized as a critical component for effective rate adaptation schemes. Recently, several collision-aware rate adaptation schemes have been propo...
Xi Chen, Daji Qiao, Jeonggyun Yu, Sunghyun Choi