Sciweavers

5465 search results - page 318 / 1093
» Assigning Types to Processes
Sort
View
TSE
2008
128views more  TSE 2008»
15 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
TWC
2008
91views more  TWC 2008»
15 years 4 months ago
Throughput and Channel Access Statistics of Generalized Selection Multiuser Scheduling
To provide a near-optimal low-complexity solution to parallel multiuser scheduling in code-division multiple-access (CDMA), we propose generalized selection multiuser diversity (GS...
Yao Ma, Jinghua Jin, Dongbo Zhang
CORR
2002
Springer
123views Education» more  CORR 2002»
15 years 4 months ago
Survey propagation: an algorithm for satisfiability
: We study the satisfiability of randomly generated formulas formed by M clauses of exactly K literals over N Boolean variables. For a given value of N the problem is known to be m...
Alfredo Braunstein, Marc Mézard, Riccardo Z...
SAC
2008
ACM
15 years 2 months ago
Strangeness-based feature weighting and classification of gene expression profiles
Achieving high classification accuracy is a major challenge in the diagnosis of cancer types based on gene expression profiles. These profiles are notoriously noisy in that a larg...
Haifeng Shao, Bei Yu, Joseph H. Nadeau
MICAI
2010
Springer
15 years 2 months ago
Combining Neural Networks Based on Dempster-Shafer Theory for Classifying Data with Imperfect Labels
This paper addresses the supervised learning in which the class membership of training data are subject to uncertainty. This problem is tackled in the framework of the Dempster-Sha...
Mahdi Tabassian, Reza Ghaderi, Reza Ebrahimpour