Sciweavers

6087 search results - page 1063 / 1218
» Knowledge discovery methods
Sort
View
COMCOM
2007
139views more  COMCOM 2007»
15 years 4 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
ISI
2008
Springer
15 years 4 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
142
Voted
IVC
2008
205views more  IVC 2008»
15 years 4 months ago
A unified framework for scene illuminant estimation
Most illuminant estimation algorithms work with the assumption of one specific type of the light source (e.g. point light source or directional light source). This assumption brin...
Wei Zhou, Chandra Kambhamettu
141
Voted
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
INFFUS
2006
101views more  INFFUS 2006»
15 years 4 months ago
Fusion rules for merging uncertain information
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports [Hun00, Hun02b, Hun02a, HS03, HS04]. Structured news report...
Anthony Hunter, Weiru Liu
« Prev « First page 1063 / 1218 Last » Next »