Sciweavers

JCP
2008
114views more  JCP 2008»
13 years 3 months ago
A Novel Feature Selection Algorithm Based on Hypothesis-Margin
Iterative search margin based algorithm(Simba) has been proven effective for feature selection. However, it still has the following disadvantages: (1) the previously proposed model...
Ming Yang, Fei Wang, Ping Yang
JCP
2008
173views more  JCP 2008»
13 years 3 months ago
Text Mining of Medical Records for Radiodiagnostic Decision-Making
William Claster, Subana Shanmuganathan, Nader Ghot...
JCP
2008
164views more  JCP 2008»
13 years 3 months ago
K-Cosine Corner Detection
This study presents a boundary-based corner detection method that achieves robust detection for digital objects containing wide angles and various curves using curvature. The bound...
Te-Hsiu Sun
JCP
2006
128views more  JCP 2006»
13 years 4 months ago
A Service Oriented Framework for Multimedia Radio Networks
- In order to enable fast deployment of new emerging services over multimedia radio networks, it is important to design an efficient service-based platform with necessary traffic m...
Asma Ben Letaifa, Sami Tabbane, Zièd Chouka...
JCP
2006
106views more  JCP 2006»
13 years 4 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
JCP
2006
115views more  JCP 2006»
13 years 4 months ago
Fault Tolerance in a Multi-Layered DRE System: A Case Study
Dynamic resource management is a crucial part of the infrastructure for emerging distributed real-time embedded systems, responsible for keeping mission-critical applications opera...
Paul Rubel, Joseph P. Loyall, Richard E. Schantz, ...
JCP
2006
102views more  JCP 2006»
13 years 4 months ago
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing
In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, cat...
Weiliang Zhao, Vijay Varadharajan, George Bryan
JCP
2006
83views more  JCP 2006»
13 years 4 months ago
Concurrent Failures and Redundant Protection Problem in Hierarchical GMPLS Networks
The generalized multiprotocol label switching (GMPLS) networks attain a hierarchical structure, and each layer maintains an independent protection mechanism, resulting in redundant...
Sung-eok Jeon
JCP
2006
100views more  JCP 2006»
13 years 4 months ago
Biometric Gait Authentication Using Accelerometer Sensor
Abstract-- This paper presents a biometric user authentication based on a person's gait. Unlike most previous gait recognition approaches, which are based on machine vision te...
Davrondzhon Gafurov, Kirsi Helkala, Torkjel S&osla...
JCP
2006
74views more  JCP 2006»
13 years 4 months ago
Local Boosting of Decision Stumps for Regression and Classification Problems
Numerous data mining problems involve an investigation of associations between features in heterogeneous datasets, where different prediction models can be more suitable for differ...
Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Pan...