Sciweavers

13180 search results - page 2421 / 2636
» Network Models
Sort
View
141
Voted
BIBM
2008
IEEE
172views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Boosting Methods for Protein Fold Recognition: An Empirical Comparison
Protein fold recognition is the prediction of protein’s tertiary structure (Fold) given the protein’s sequence without relying on sequence similarity. Using machine learning t...
Yazhene Krishnaraj, Chandan K. Reddy
138
Voted
CEC
2008
IEEE
15 years 10 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
122
Voted
CEC
2008
IEEE
15 years 10 months ago
Conventionalization of linguistic categories under simple communicative constraints
—The language game approach is widely adopted to study conventionalization of linguistic knowledge. Most of contemporary models concentrate on the dynamics of language games in r...
Tao Gong, Andrea Puglisi, Vittorio Loreto, William...
CISS
2008
IEEE
15 years 10 months ago
Achievable rates and training optimization for fading relay channels with memory
—In this paper, transmission over time-selective, flat fading relay channels is studied. It is assumed that channel fading coefficients are not known a priori. Transmission tak...
Sami Akin, Mustafa Cenk Gursoy
COMSWARE
2008
IEEE
15 years 10 months ago
Location management area (LMA)-based MBS handover in mobile WiMAX systems
Abstract—Mobile WiMAX aims to provide multimedia multicast/broadcast service (MBS) as well as elastic data service. However, supporting delay sensitive applications like video/au...
Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheo...
« Prev « First page 2421 / 2636 Last » Next »