Sciweavers

7379 search results - page 1170 / 1476
» How Many Clusters
Sort
View
JCM
2006
129views more  JCM 2006»
15 years 4 months ago
T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks
There are many difficult challenges ahead in the design of an energy-efficient communication stack for wireless sensor networks. Due to the severe sensor node constraints, protocol...
S. Selvakennedy, Sukunesan Sinnappan, Yi Shang
DEDS
2007
104views more  DEDS 2007»
15 years 4 months ago
Trellis Processes : A Compact Representation for Runs of Concurrent Systems
The unfolding of a concurrent system represents in a compact manner all possible runs of this system. Unfoldings are used in many applications, ranging from model-checking (offlin...
Eric Fabre
JCP
2006
85views more  JCP 2006»
15 years 4 months ago
A Constructive Meta-Level Feature Selection Method based on Method Repositories
Feature selection is one of key issues related with data pre-processing of classification task in a data mining process. Although many efforts have been done to improve typical fea...
Hidenao Abe, Takahira Yamaguchi
JDA
2006
77views more  JDA 2006»
15 years 4 months ago
On Multi-threaded Metrical Task Systems
Traditionally, on-line problems have been studied under the assumption that there is a unique sequence of requests that must be served. This approach is common to most general mod...
Esteban Feuerstein, Steven S. Seiden, Alejandro St...
140
Voted
KES
2008
Springer
15 years 4 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
« Prev « First page 1170 / 1476 Last » Next »