Sciweavers

704 search results - page 41 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
JCP
2008
206views more  JCP 2008»
14 years 11 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
SRDS
1996
IEEE
15 years 3 months ago
Exploiting Data-Flow for Fault-Tolerance in a Wide-Area Parallel System
Wide-area parallel processing systems will soon be available to researchers to solve a range of problems. In these systems, it is certain that host failures and other faults will ...
Anh Nguyen-Tuong, Andrew S. Grimshaw, Mark Hyett
CSDA
2007
134views more  CSDA 2007»
14 years 11 months ago
Variational approximations in Bayesian model selection for finite mixture distributions
Variational methods for model comparison have become popular in the neural computing/machine learning literature. In this paper we explore their application to the Bayesian analys...
Clare A. McGrory, D. M. Titterington
ACMSE
2006
ACM
15 years 5 months ago
Reconstructing networks using co-temporal functions
Reconstructing networks from time series data is a difficult inverse problem. We apply two methods to this problem using co-temporal functions. Co-temporal functions capture mathe...
Edward E. Allen, Anthony Pecorella, Jacquelyn S. F...
WCNC
2008
IEEE
15 years 5 months ago
Exploiting Historical Spectrum Occupancy Information for Adaptive Spectrum Sensing
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...