Sciweavers

2006 search results - page 151 / 402
» Heuristic Security-Testing Methods
Sort
View
115
Voted
IR
2007
15 years 2 months ago
An empirical study of tokenization strategies for biomedical information retrieval
Due to the great variation of biological names in biomedical text, appropriate tokenization is an important preprocessing step for biomedical information retrieval. Despite its im...
Jing Jiang, ChengXiang Zhai
TKDE
2008
105views more  TKDE 2008»
15 years 2 months ago
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System
We present a genetic algorithm for tackling a file assignment problem for a large-scale video-on-demand system. The file assignment problem is to find the optimal replication and a...
Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric ...
IDA
2000
Springer
15 years 2 months ago
Reducing redundancy in characteristic rule discovery by using integer programming techniques
The discovery of characteristic rules is a well-known data mining task and has lead to several successful applications. However, because of the descriptive nature of characteristic...
Tom Brijs, Koen Vanhoof, Geert Wets
JECR
2002
220views more  JECR 2002»
15 years 2 months ago
Usability for Mobile Commerce Across Multiple Form Factors
Current research on usability for mobile commerce has focused on single platforms and very limited aspects of commerce activities. We conducted an exploratory study to examine usa...
Susy S. Chan, Xiaowen Fang, Jack R. Brzezinski, Ya...
148
Voted
SECON
2010
IEEE
15 years 7 days ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das