Sciweavers

7930 search results - page 1314 / 1586
» Greedy in Approximation Algorithms
Sort
View
148
Voted
OL
2007
103views more  OL 2007»
15 years 4 months ago
Support vector machine via nonlinear rescaling method
In this paper we construct the linear support vector machine (SVM) based on the nonlinear rescaling (NR) methodology (see [9, 11, 10] and references therein). The formulation of t...
Roman A. Polyak, Shen-Shyang Ho, Igor Griva
PAMI
2007
107views more  PAMI 2007»
15 years 4 months ago
Segmentation of Multivariate Mixed Data via Lossy Data Coding and Compression
—In this paper, based on ideas from lossy data coding and compression, we present a simple but effective technique for segmenting multivariate mixed data that are drawn from a mi...
Yi Ma, Harm Derksen, Wei Hong, John Wright
COMCOM
2008
99views more  COMCOM 2008»
15 years 3 months ago
Reliability improvement for an RFID-based psychiatric patient localization system
Collaboration between Field Generators, Readers and Tags generates the required functions in using radio frequency identification (RFID) for psychiatric patient localization. The ...
Chieh-Ling Huang, Pau-Choo Chung, Ming-Hua Tsai, Y...
ER
2010
Springer
121views Database» more  ER 2010»
15 years 3 months ago
Reasoning with Optional and Preferred Requirements
Abstract. Of particular concern in requirements engineering is the selection of requirements to implement in the next release of a system. To that end, there has been recent work o...
Neil A. Ernst, John Mylopoulos, Alexander Borgida,...
IEEECIT
2010
IEEE
15 years 3 months ago
Predictive and Dynamic Resource Allocation for Enterprise Applications
—Dynamic resource allocation has the potential to provide significant increases in total revenue in enterprise systems through the reallocation of available resources as the dem...
M. Al-Ghamdi, Adam P. Chester, Stephen A. Jarvis
« Prev « First page 1314 / 1586 Last » Next »