Sciweavers

12257 search results - page 392 / 2452
» Analysis of Algorithms
Sort
View
126
Voted
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
15 years 7 months ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
169
Voted
DAWAK
2010
Springer
15 years 5 months ago
Mining Closed Itemsets in Data Stream Using Formal Concept Analysis
Mining of frequent closed itemsets has been shown to be more efficient than mining frequent itemsets for generating non-redundant association rules. The task is challenging in data...
Anamika Gupta, Vasudha Bhatnagar, Naveen Kumar
148
Voted
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 4 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
131
Voted
CGF
1999
79views more  CGF 1999»
15 years 4 months ago
A Practical Analysis of Clustering Strategies for Hierarchical Radiosity
The calculation of radiant energy balance in complex scenes has been made possible by hierarchical radiosity methods based on clustering mechanisms. Although clustering offers an ...
Jean-Marc Hasenfratz, Cyrille Damez, Franço...
TWC
2010
14 years 11 months ago
Joint channel estimation and resource allocation for MIMO systems-part II: multi-user and numerical analysis
This is the second part of a two-part paper on the joint channel estimation and resource allocation problem in MIMO systems with noisy channel estimation at the receiver side and p...
Alkan Soysal, Sennur Ulukus