Sciweavers

2348 search results - page 280 / 470
» Evaluation Patterns of Tele-Haptics
Sort
View
108
Voted
ICDCS
2007
IEEE
15 years 7 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
15 years 7 months ago
Heuristic speciation for evolving neural network ensemble
Speciation is an important concept in evolutionary computation. It refers to an enhancements of evolutionary algorithms to generate a set of diverse solutions. The concept is stud...
Shin Ando
99
Voted
ACMSE
2006
ACM
15 years 6 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan
126
Voted
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 1 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...
KDD
2008
ACM
239views Data Mining» more  KDD 2008»
16 years 1 months ago
Mining adaptively frequent closed unlabeled rooted trees in data streams
Closed patterns are powerful representatives of frequent patterns, since they eliminate redundant information. We propose a new approach for mining closed unlabeled rooted trees a...
Albert Bifet, Ricard Gavaldà