Sciweavers

274 search results - page 19 / 55
» When Two Case Bases Are Better than One: Exploiting Multiple...
Sort
View
CDC
2009
IEEE
208views Control Systems» more  CDC 2009»
13 years 8 months ago
Sensor selection for hypothesis testing in wireless sensor networks: a Kullback-Leibler based approach
We consider the problem of selecting a subset of p out of n sensors for the purpose of event detection, in a wireless sensor network (WSN). Occurrence or not of the event of intere...
Dragana Bajovic, Bruno Sinopoli, João Xavie...
ISCA
2003
IEEE
144views Hardware» more  ISCA 2003»
14 years 21 days ago
Half-Price Architecture
Current-generation microprocessors are designed to process instructions with one and two source operands at equal cost. Handling two source operands requires multiple ports for ea...
Ilhyun Kim, Mikko H. Lipasti
INFOCOM
2010
IEEE
13 years 5 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 8 months ago
Frequent pattern mining with uncertain data
In this paper, we will examine the frequent pattern mining for uncertain data sets. We will show how the broad classes of algorithms can be extended to the uncertain data setting....
Charu C. Aggarwal, Yan Li, Jianyong Wang, Jing Wan...
CSB
2005
IEEE
137views Bioinformatics» more  CSB 2005»
14 years 1 months ago
A Learned Comparative Expression Measure for Affymetrix GeneChip DNA Microarrays
Perhaps the most common question that a microarray study can ask is, “Between two given biological conditions, which genes exhibit changed expression levels?” Existing methods...
Will Sheffler, Eli Upfal, John Sedivy, William Sta...