Sciweavers

2032 search results - page 369 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
CEC
2007
IEEE
15 years 4 months ago
Computational intelligence algorithms for risk-adjusted trading strategies
Abstract— This paper investigates the performance of trading strategies identified through Computational Intelligence techniques. We focus on trading rules derived by Genetic Pr...
Nicos G. Pavlidis, E. G. Pavlidis, Michael G. Epit...
IWSOS
2009
Springer
15 years 2 months ago
Self-management of Routing on Human Proximity Networks
Abstract. Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic proc...
Graham Williamson, Davide Cellai, Simon A. Dobson,...
ERCIMDL
2010
Springer
118views Education» more  ERCIMDL 2010»
14 years 10 months ago
Relevance in Technicolor
In this article we propose the concept of relevance criteria profiles, which provide a global view of user behaviour in judging the relevance of retrieved information. We further p...
Ulises Cerviño Beresi, Yunhyong Kim, Dawei ...
MOBICOM
2003
ACM
15 years 2 months ago
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Significant TCP unfairness in ad hoc wireless networks has been reported during the past several years. This unfairness results from the nature of the shared wireless medium and ...
Kaixin Xu, Mario Gerla, Lantao Qi, Yantai Shu
100
Voted
DCOSS
2008
Springer
14 years 11 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo