Sciweavers

2006 search results - page 151 / 402
» Heuristic Security-Testing Methods
Sort
View
99
Voted
IR
2007
15 years 21 days ago
An empirical study of tokenization strategies for biomedical information retrieval
Due to the great variation of biological names in biomedical text, appropriate tokenization is an important preprocessing step for biomedical information retrieval. Despite its im...
Jing Jiang, ChengXiang Zhai
98
Voted
TKDE
2008
105views more  TKDE 2008»
15 years 21 days ago
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System
We present a genetic algorithm for tackling a file assignment problem for a large-scale video-on-demand system. The file assignment problem is to find the optimal replication and a...
Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric ...
101
Voted
IDA
2000
Springer
15 years 19 days ago
Reducing redundancy in characteristic rule discovery by using integer programming techniques
The discovery of characteristic rules is a well-known data mining task and has lead to several successful applications. However, because of the descriptive nature of characteristic...
Tom Brijs, Koen Vanhoof, Geert Wets
JECR
2002
220views more  JECR 2002»
15 years 14 days ago
Usability for Mobile Commerce Across Multiple Form Factors
Current research on usability for mobile commerce has focused on single platforms and very limited aspects of commerce activities. We conducted an exploratory study to examine usa...
Susy S. Chan, Xiaowen Fang, Jack R. Brzezinski, Ya...
133
Voted
SECON
2010
IEEE
14 years 10 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das