Sciweavers

3353 search results - page 560 / 671
» Laver and set theory
Sort
View
JMLR
2006
103views more  JMLR 2006»
14 years 10 months ago
Pattern Recognition for Conditionally Independent Data
In this work we consider the task of relaxing the i.i.d. assumption in pattern recognition (or classification), aiming to make existing learning algorithms applicable to a wider r...
Daniil Ryabko
JNW
2006
81views more  JNW 2006»
14 years 10 months ago
A Noble Fuzzy-based Mobile Tracking Scheme
In this study, we propose a novel mobile tracking method based on Multi-Criteria Decision Making (MCDM), in which uncertain parameters such as Pilot Signal Strength (PSS), the dist...
Soo Chang Kim, Jong Chan Lee, Yeon-Seung Shin
ENTCS
2007
93views more  ENTCS 2007»
14 years 10 months ago
Modeling Pointer Redirection as Cyclic Term-graph Rewriting
We tackle the problem of data-structure rewriting including global and local pointer redirections. Each basic rewrite step may perform three kinds of actions: (i) Local redirectio...
Dominique Duval, Rachid Echahed, Fréd&eacut...
ENTCS
2007
126views more  ENTCS 2007»
14 years 10 months ago
Modelling Calculi with Name Mobility using Graphs with Equivalences
In the theory of graph rewriting, the use of coalescing rules, i.e., of rules which besides deleting and generating graph items, can coalesce some parts of the graph, turns out to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
JSAC
2006
128views more  JSAC 2006»
14 years 10 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum