Sciweavers

10909 search results - page 225 / 2182
» Evaluating Backup Algorithms
Sort
View
140
Voted
WSCG
2001
124views more  WSCG 2001»
15 years 5 months ago
Occlusion Evaluation in Hierarchical Radiosity
In any hierarchical radiosity method, the most expensive part is the evaluation of the visibility. Many methods use sampling and ray casting to determine this term. Space partitio...
Yann Dupuy, Mathias Paulin, René Caubet
AAI
2006
110views more  AAI 2006»
15 years 4 months ago
Evaluation of Classifiers for an Uneven Class Distribution Problem
Classification problems with uneven class distributions present several difficulties during the training as well as during the evaluation process of classifiers. A classification ...
Sophia Daskalaki, Ioannis Kopanas, Nikolaos M. Avo...
130
Voted
AMC
2006
100views more  AMC 2006»
15 years 4 months ago
Reliability evaluation of multi-component cold-standby redundant systems
A new methodology for the reliability evaluation of an l-dissimilar-unit non-repairable cold-standby redundant system is introduced in this paper. Each unit is composed of a numbe...
Amir Azaron, Hideki Katagiri, Kosuke Kato, Masatos...
JSAC
2006
111views more  JSAC 2006»
15 years 4 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
165
Voted
ICDE
2009
IEEE
178views Database» more  ICDE 2009»
15 years 2 months ago
Efficient Query Evaluation over Temporally Correlated Probabilistic Streams
Many real world applications such as sensor networks and other monitoring applications naturally generate probabilistic streams that are highly correlated in both time and space. ...
Bhargav Kanagal, Amol Deshpande