Results 1 - 10
of
291
Citation
, 2013
"... A study was conducted in Sringeri Taluk constituted with 49 villages in Chikmagalur district of Karnataka, India to assess the population structure, literacy level, live stock and their management, dependence of people on forest and its products so as to develop measures for sustenance income genera ..."
Abstract
- Add to MetaCart
generation to the people living in the study area and to conserve the forest ecosystem. The data collected through questionnaire and compiled revealed that fair literacy level exists among the tribes community. Agriculture is the main occupation of the people in the villages surveyed for the study. Measures
Recommended Citation
, 2007
"... Operational risk assessment of chemical industries by exploiting accident databases ..."
Abstract
- Add to MetaCart
Operational risk assessment of chemical industries by exploiting accident databases
Recommended Citation
, 2007
"... Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of appl ..."
Abstract
- Add to MetaCart
Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of applications and network platforms has made them difficult to use. Instead of proposing yet another power management protocol, this thesis focuses on providing link layer support towards realizing a Unified Power Management Architecture (UPMA) for flexible radio power management in wireless sensor networks. In contrast to the monolithic approaches adopted by existing power management solutions, we provide (1) a set of standard interfaces that allow different power management protocols existing at the link layer to be easily implemented on top of common MAC level functionality, (2) an architectural framework for enabling these protocols to be easily swapped in and out depending on the needs of the applications that require them, and (3) a mechanism for coordinating the existence of multiple applications, each of which may have... Read complete abstract on page 2.
Asymptotic properties of proportional-fair sharing algorithms
- In Proc., 2002 Allerton Conf., Champaigne-Urbana, IL, 2002. Univ. of Illinois
"... We are concerned with the allocation of transmitter time and power for randomly time varying mobile data communications. Time is divided into small scheduling intervals, called slots, and information on the channel rates for the various users is available at the start of the slot, when the user sele ..."
Abstract
-
Cited by 44 (1 self)
- Add to MetaCart
selections are made. There is a conflict between selecting the user set that can get the most immediate data through and helping users with poor average rates. The Proportional Fair Sharing method (PFS) deals with such conflicts. In [5, 6] the convergence and basic qualitative properties were analyzed
PivotPaths: Strolling through Faceted Information Spaces
"... Fig. 1. A resource anchor selects a paper’s references and citations. Details are shown for one of its authors, Mary Czerwinski. Abstract—We present PivotPaths, an interactive visualization for exploring faceted information resources. During both work and leisure, we increasingly interact with infor ..."
Abstract
-
Cited by 19 (0 self)
- Add to MetaCart
Fig. 1. A resource anchor selects a paper’s references and citations. Details are shown for one of its authors, Mary Czerwinski. Abstract—We present PivotPaths, an interactive visualization for exploring faceted information resources. During both work and leisure, we increasingly interact
Proceedings of the Workshop on the Reuse of Webbased Information
, 1998
"... : A search engine can index a concept that appears entirely on a single page. But concepts can span several pages. For instance, a page on trees may be linked to a page on lecture notes for a data structures course. If the trees page does not specifically mention lecture notes, then a search engin ..."
Abstract
- Add to MetaCart
of hyperlinks, that transits through pages with specific content. For instance, there must be a concept path from the lecture notes page to the trees page to create the lecture notes on trees concept. The concept paths must be relatively few (certainly much fewer than the overall number of paths in the WWW
TCPAfrica: An Adaptive and Fair Rapid Increase Rule for Scalable TCP
- Proc.IEEE INFOCOM2005, Vol.3
, 2005
"... routinely fail to meet end-to-end performance expectations. The default transport control protocol for best effort data traffic is currently TCP, which does not scale well to lOOMbps and higher networks over long distances. In congestion avoidance TCP is not swift enough to fully utilize resources o ..."
Abstract
-
Cited by 30 (0 self)
- Add to MetaCart
over paths with a high delay bandwidth product. First attempts to alleviate this problem by equipping TCP with increased aggressiveness have shown the disadvantage uf pnor fairness with the ubiquitous standard TCP-Reno, or in some cases, even amang two connections running over the same path. We propose
TRACKING BEHAVIORAL CONSTRUCT USE THROUGH CITATIONS: A RELATION EXTRACTION APPROACH
"... The ever-increasing number of publications in the behavioral sciences has yielded a large set of behavioral theories, constructs and their relationships. In this study, we propose a novel method to discover this data set through construct-level citations. In behavioral science, the reuse, adaptation ..."
Abstract
- Add to MetaCart
The ever-increasing number of publications in the behavioral sciences has yielded a large set of behavioral theories, constructs and their relationships. In this study, we propose a novel method to discover this data set through construct-level citations. In behavioral science, the reuse
On Using the Ad-hoc Network Model in Cellular Packet Data Networks
, 2002
"... While several approaches have been proposed in literature for improving the performance of wireless packet data networks, a recent class of approaches has focused on improving the underlying wireless network model itself. Several of such approaches have shown that using peer-to-peer communication, a ..."
Abstract
-
Cited by 38 (3 self)
- Add to MetaCart
characterized. In this paper, we investigate the benefits of using an ad-hoc network model in cellular wireless packet data networks. We find that while the ad-hoc network model has significantly better spatial reuse characteristics, the improved spatial reuse does not translate into better throughput
Data Mining the Data Processing Technologies for Inventory Management
"... Abstract—This research applied various data mining approaches to investigate the innovations of data processing technologies for inventory management based on the database of the United States Patent and Trademark Office. The first objective of data mining in this study is to find the core technolog ..."
Abstract
- Add to MetaCart
technologies by evaluating patent citation matrix and patent strength. This information can help companies to choose suitable tools through the understanding of the most essential innovations. A total of 63 core technologies were identified from 949 patents under the US patent class of 705/28. Besides, a
Results 1 - 10
of
291