Sciweavers

2131 search results - page 298 / 427
» Immunity for Closed Sets
Sort
View
ICIS
1994
15 years 1 months ago
Valuing IT through Virtual Process Measurement
The so called "productivity paradox" associated with information technology remains the focus of active research in information systems. One explanation involves the dea...
Mark E. Nissen
ADHOCNOW
2009
Springer
15 years 1 months ago
Localized Sensor Self-deployment with Coverage Guarantee in Complex Environment
Abstract. In focused coverage problem, sensors are required to be deployed around a given point of interest (POI) with respect to a priority requirement: an area close to POI has h...
Xu Li, Nathalie Mitton, Isabelle Ryl, David Simplo...
DEXAW
2010
IEEE
202views Database» more  DEXAW 2010»
15 years 29 days ago
Identifying Sentence-Level Semantic Content Units with Topic Models
Abstract--Statistical approaches to document content modeling typically focus either on broad topics or on discourselevel subtopics of a text. We present an analysis of the perform...
Leonhard Hennig, Thomas Strecker, Sascha Narr, Ern...
ECAI
2010
Springer
15 years 29 days ago
On Finding Compromise Solutions in Multiobjective Markov Decision Processes
A Markov Decision Process (MDP) is a general model for solving planning problems under uncertainty. It has been extended to multiobjective MDP to address multicriteria or multiagen...
Patrice Perny, Paul Weng
GRC
2008
IEEE
15 years 28 days ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...