Sciweavers

2704 search results - page 475 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
TMC
2011
164views more  TMC 2011»
14 years 8 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
CIKM
2005
Springer
15 years 7 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
CTW
2007
121views more  CTW 2007»
15 years 1 months ago
Regularly irregular: how groups reconcile cross-cutting agendas and demand in healthcare
Abstract The flow of technical work in acute healthcare varies unpredictably, in patterns that occur regularly enough that they can be managed. Acute care organizations develop wa...
Christopher P. Nemeth, Mark Nunnally, Michael F. O...
IDA
2011
Springer
14 years 8 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
ICIP
2007
IEEE
16 years 3 months ago
View Synthesis for Robust Distributed Video Compression in Wireless Camera Networks
We propose a method for delivering error-resilient video from wireless camera networks in a distributed fashion over lossy channels. Our scheme is based on distributed source codi...
Chuohao Yeo, Jiajun Wang, Kannan Ramchandran