Results 1 - 10
of
1,895
MACAW: A Media Access Protocol for Wireless LAN's
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract
-
Cited by 839 (11 self)
- Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
and analysis; and to Gerrit Wolf for help in analytic planning. This report was prepared in connection with research supported by the Office of Naval Research (Organizational Effectiveness Research Program,, and by the Manpower Administration, U. S. Department of Labor . Since grantees conducting research
ASCENT: Adaptive self-configuring sensor networks topologies
, 2004
"... Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost will allow these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks w ..."
Abstract
-
Cited by 449 (15 self)
- Add to MetaCart
, and experimental measurements. We show that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.
On the Adequateness of the Connection Method
- In Proceedings of the AAAI National Conference on Artificial Intelligence
, 1993
"... Roughly speaking, adequatness is the property of a theorem proving method to solve simpler problems faster than more difficult ones. Automated inferencing methods are often not adequate as they require thousands of steps to solve problems which humans solve effortlessly, spontaneously, and with rema ..."
Abstract
-
Cited by 10 (6 self)
- Add to MetaCart
Roughly speaking, adequatness is the property of a theorem proving method to solve simpler problems faster than more difficult ones. Automated inferencing methods are often not adequate as they require thousands of steps to solve problems which humans solve effortlessly, spontaneously
A Framework for Generating Network-Based Moving Objects
- GEOINFORMATICA
, 2002
"... Benchmarking spatiotemporal database systems requires the definition of suitable datasets simulating the typical behavior of moving objects. Previous approaches for generating spatiotemporal data do not consider that moving objects often follow a given network. Therefore, benchmarks require datasets ..."
Abstract
-
Cited by 284 (1 self)
- Add to MetaCart
datasets consisting of such "network-based" moving objects. In this paper, the most important properties of network-based moving objects are presented and discussed. Essential aspects are the maximum speed and the maximum capacity of connections, the influence of other moving objects on the speed
Resource allocation and cross-layer control in wireless networks
- Foundations and Trends in Networking
, 2006
"... Information flow in a telecommunication network is accomplished through the interaction of mechanisms at various design layers with the end goal of supporting the information exchange needs of the applications. In wireless networks in particular, the different layers interact in a nontrivial manner ..."
Abstract
-
Cited by 276 (59 self)
- Add to MetaCart
for arbitrary network topologies as well as traffic forwarding modes, including datagrams and virtual circuits. Furthermore the time varying nature of a wireless network, due either to fading channels or to changing connectivity due to mobility, is adequately captured in our model to allow for state dependent
CHAMELEON: A Hierarchical Clustering Algorithm Using Dynamic Modeling
, 1999
"... Clustering in data mining is a discovery process that groups a set of data such that the intracluster similarity is maximized and the intercluster similarity is minimized. Existing clustering algorithms, such as K-means, PAM, CLARANS, DBSCAN, CURE, and ROCK are designed to find clusters that fit s ..."
Abstract
-
Cited by 268 (19 self)
- Add to MetaCart
some static models. These algorithms can breakdown if the choice of parameters in the static model is incorrect with respect to the data set being clustered, or if the model is not adequate to capture the characteristics of clusters. Furthermore, most of these algorithms breakdown when the data
On Adequate Transversals
, 2007
"... We consider adequate transversals of abundant semigroups and prove that, in a partic-ular case, there is a natural embedding of an inverse transversal within a certain regular subsemigroup. We also introduce the concepts of simplistic, perfect and quasi-adequate transversal and provide a number of i ..."
Abstract
- Add to MetaCart
We consider adequate transversals of abundant semigroups and prove that, in a partic-ular case, there is a natural embedding of an inverse transversal within a certain regular subsemigroup. We also introduce the concepts of simplistic, perfect and quasi-adequate transversal and provide a number
Ontologies and semantics for seamless connectivity
- SIGMOD Record
, 2004
"... The goal of having networks of seamlessly connected people, software agents and IT systems remains elusive. Early integration efforts focused on connectivity at the physical and syntactic layers. Great strides were made; there are many commercial tools available, for example to assist with enterpris ..."
Abstract
-
Cited by 95 (0 self)
- Add to MetaCart
with enterprise application integration. It is now recognized that physical and syntactic connectivity is not adequate. A variety of research systems have been developed addressing some of the semantic issues. In this paper, we argue that ontologies in particular and semantics-based technologies in general
Human Detection via Classification on Riemannian Manifolds
- IN IEEE CONF. COMP. VISION AND PATTERN RECOGNITION (CVPR
, 2007
"... We present a new algorithm to detect humans in still images utilizing covariance matrices as object descriptors. Since these descriptors do not lie on a vector space, well known machine learning techniques are not adequate to learn the classifiers. The space of d-dimensional nonsin-gular covariance ..."
Abstract
-
Cited by 170 (7 self)
- Add to MetaCart
We present a new algorithm to detect humans in still images utilizing covariance matrices as object descriptors. Since these descriptors do not lie on a vector space, well known machine learning techniques are not adequate to learn the classifiers. The space of d-dimensional nonsin-gular covariance
Results 1 - 10
of
1,895