Sciweavers

7318 search results - page 1371 / 1464
» Models of real-valued measurability
Sort
View
TIFS
2010
184views more  TIFS 2010»
14 years 8 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
TKDE
2010
186views more  TKDE 2010»
14 years 8 months ago
A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis
—Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products, etc.). Social tag...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
WIOPT
2010
IEEE
14 years 8 months ago
Flunet: Automated tracking of contacts during flu season
— By analyzing people’s contact patterns over time, it is possible to build efficient delay tolerant networking (DTN) algorithms and derive important data for parameterizing an...
Mohammad S. Hashemian, Kevin G. Stanley, Nathaniel...
EUSFLAT
2009
117views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Type-II Fuzzy Possibilistic C-Mean Clustering
Fuzzy clustering is well known as a robust and efficient way to reduce computation cost to obtain the better results. In the literature, many robust fuzzy clustering models have be...
Mohammad Hossein Fazel Zarandi, Marzie Zarinbal, I...
AVI
2010
14 years 7 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
« Prev « First page 1371 / 1464 Last » Next »