Sciweavers

1354 search results - page 145 / 271
» Comparing Agent-Oriented Methodologies
Sort
View
OL
2007
103views more  OL 2007»
14 years 9 months ago
Support vector machine via nonlinear rescaling method
In this paper we construct the linear support vector machine (SVM) based on the nonlinear rescaling (NR) methodology (see [9, 11, 10] and references therein). The formulation of t...
Roman A. Polyak, Shen-Shyang Ho, Igor Griva
VTC
2010
IEEE
102views Communications» more  VTC 2010»
14 years 8 months ago
Trace-Based Evaluation of Rate Adaptation Schemes in Vehicular Environments
Abstract—There has been a variety of rate adaptation solutions proposed for both indoor and mobile scenarios. However, dynamic channel changing conditions (e.g., temporal channel...
Kevin C. Lee, Juan M. Navarro, Tin Y. Chong, Uichi...
TMA
2010
Springer
140views Management» more  TMA 2010»
14 years 7 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
IESS
2009
Springer
182views Hardware» more  IESS 2009»
14 years 7 months ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
15 years 10 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li