Sciweavers

2500 search results - page 377 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
ICDCSW
2006
IEEE
15 years 4 months ago
Dealing with Class Skew in Context Recognition
As research in context recognition moves towards more maturity and real life applications, appropriate and reliable performance metrics gain importance. This paper focuses on the ...
Mathias Stäger, Paul Lukowicz, Gerhard Tr&oum...
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
15 years 4 months ago
Predictive Integration of Gene Ontology-Driven Similarity and Functional Interactions
There is a need to develop methods to automatically incorporate prior knowledge to support the prediction and validation of novel functional associations. One such important sourc...
Francisco Azuaje, Haiying Wang, Huiru Zheng, Olivi...
IJCNN
2006
IEEE
15 years 4 months ago
A Connectionist Approach to Speech Understanding
— This paper argues that connectionist systems are a good approach to implement a speech understanding computational model. In this direction, we propose SUM, a Speech Understand...
Daniel Nehme Müller, Mozart Lemos de Siqueira...
IPCCC
2006
IEEE
15 years 4 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
IPPS
2006
IEEE
15 years 4 months ago
Fault injection in distributed Java applications
In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behaviour of a distributed program in an environment where ...
William Hoarau, Sébastien Tixeuil, Fabien V...