Sciweavers

733 search results - page 49 / 147
» Model Reuse through Hardware Design Patterns
Sort
View
JMLR
2010
120views more  JMLR 2010»
14 years 4 months ago
Effective Wrapper-Filter hybridization through GRASP Schemata
Of all of the challenges which face the selection of relevant features for predictive data mining or pattern recognition modeling, the adaptation of computational intelligence tec...
Mohamed Amir Esseghir
IAT
2006
IEEE
15 years 3 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
ASPDAC
2009
ACM
111views Hardware» more  ASPDAC 2009»
15 years 4 months ago
A UML-based approach for heterogeneous IP integration
- With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ...
Zhenxin Sun, Weng-Fai Wong
IASTEDSEA
2004
14 years 11 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
MOBIHOC
2009
ACM
15 years 10 months ago
Efficient resource management in OFDMA Femto cells
Femto cells are a cost-effective means of providing ubiquitous connectivity in future broadband wireless networks. While their primary purpose has been to improve coverage in curr...
Karthikeyan Sundaresan, Sampath Rangarajan