Sciweavers

6906 search results - page 107 / 1382
» An algorithm for modelling key terms
Sort
View
PEWASUN
2006
ACM
15 years 10 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 4 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
CAAN
2007
Springer
15 years 10 months ago
Cleaning Random d-Regular Graphs with Brushes Using a Degree-Greedy Algorithm
In the recently introduced model for cleaning a graph with brushes, we use a degree-greedy algorithm to clean a random d-regular graph on n vertices (with dn even). We then use a d...
Margaret-Ellen Messinger, Pawel Pralat, Richard J....
SDM
2008
SIAM
117views Data Mining» more  SDM 2008»
15 years 5 months ago
A Feature Selection Algorithm Capable of Handling Extremely Large Data Dimensionality
With the advent of high throughput technologies, feature selection has become increasingly important in a wide range of scientific disciplines. We propose a new feature selection ...
Yijun Sun, Sinisa Todorovic, Steve Goodison
JCC
2007
70views more  JCC 2007»
15 years 4 months ago
Self-organizing superimposition algorithm for conformational sampling
Abstract: A novel self-organizing algorithm for conformational sampling is introduced, in which precomputed conformations of rigid fragments are used as templates to enforce the de...
Fangqiang Zhu, Dimitris K. Agrafiotis