Sciweavers

5866 search results - page 1128 / 1174
» An e-Process Selection Model
Sort
View
ICDE
2007
IEEE
211views Database» more  ICDE 2007»
15 years 8 months ago
Document Representation and Dimension Reduction for Text Clustering
Increasingly large text datasets and the high dimensionality associated with natural language create a great challenge in text mining. In this research, a systematic study is cond...
M. Mahdi Shafiei, Singer Wang, Roger Zhang, Evange...
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
SMC
2007
IEEE
156views Control Systems» more  SMC 2007»
15 years 8 months ago
Dynamic fusion of classifiers for fault diagnosis
—This paper considers the problem of temporally fusing classifier outputs to improve the overall diagnostic classification accuracy in safety-critical systems. Here, we discuss d...
Satnam Singh, Kihoon Choi, Anuradha Kodali, Krishn...
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
15 years 8 months ago
Prediction method to maintain QoS in weather impacted wireless and satellite networks
—Rain and snow can have a distorting effect on Ku and Ka bands signal fidelity resulting in excessive digital transmission errors. This loss of signal attenuation is commonly ref...
Kamal Harb, Anand Srinivasan, Changcheng Huang, Br...
CCS
2007
ACM
15 years 8 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
« Prev « First page 1128 / 1174 Last » Next »