Sciweavers

1566 search results - page 278 / 314
» Contification Using Dominators
Sort
View
DCOSS
2010
Springer
15 years 2 months ago
Stateful Mobile Modules for Sensor Networks
Most sensor network applications are dominated by the acquisition of sensor values. Due to energy limitations and high energy costs of communication, in-network processing has been...
Moritz Strübe, Rüdiger Kapitza, Klaus St...
CEC
2009
IEEE
15 years 2 months ago
Automatic clustering with multi-objective Differential Evolution algorithms
—This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performa...
Kaushik Suresh, Debarati Kundu, Sayan Ghosh, Swaga...
76
Voted
HPCC
2009
Springer
15 years 2 months ago
Grid Network Dimensioning by Modeling the Deadline Constrained Bulk Data Transfers
—Grid applications need to move large amounts of data between distributed resources within deterministic time frames. In most cases it is possible to specify the volume and the d...
Kashif Munir, Pascale Vicat-Blanc Primet, Michael ...
PAKDD
2001
ACM
121views Data Mining» more  PAKDD 2001»
15 years 2 months ago
Direct Domain Knowledge Inclusion in the PA3 Rule Induction Algorithm
Inclusion of domain knowledge in a process of knowledge discovery in databases is a complex but very important part of successful knowledge discovery solutions. In real-life data m...
Pedro de Almeida
117
Voted
PFE
2001
Springer
15 years 2 months ago
Introducing Product Lines in Small Embedded Systems
: How do you introduce product lines into a hardware dominated organization that has increasing software architecture awareness and products with extremely limited memory resources...
Christoph Stoermer, Markus Roeddiger