Sciweavers

10909 search results - page 168 / 2182
» Evaluating Backup Algorithms
Sort
View
COMCOM
2007
139views more  COMCOM 2007»
15 years 4 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
IS
2007
15 years 4 months ago
Evaluation of probabilistic queries over imprecise data in constantly-evolving environments
Sensors are often employed to monitor continuously changing entities like locations of moving objects and temperature. The sensor readings are reported to a database system, and a...
Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabha...
JSS
2007
120views more  JSS 2007»
15 years 3 months ago
The design and evaluation of path matching schemes on compressed control flow traces
A control flow trace captures the complete sequence of dynamically executed basic blocks and function calls. It is usually of very large size and therefore commonly stored in com...
Yongjing Lin, Youtao Zhang, Rajiv Gupta
ANTSW
2010
Springer
15 years 2 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
EUSFLAT
2009
135views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
A Logic-Based Approach for Evaluating Interpretability of Fuzzy Rule-Based Classifiers
Abstract-- We describe an automatic approach for evaluating interpretability of fuzzy rule-based classifiers. The approach is based on the logical view of fuzzy rules, which are in...
Corrado Mencar, Ciro Castiello, Anna Maria Fanelli