Sciweavers

1973 search results - page 310 / 395
» Network Performance Assessment for Neurofuzzy Data Modelling
Sort
View
TSMC
2002
134views more  TSMC 2002»
14 years 9 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
SUTC
2006
IEEE
15 years 4 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
MM
2004
ACM
145views Multimedia» more  MM 2004»
15 years 3 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz
BMCBI
2007
131views more  BMCBI 2007»
14 years 10 months ago
An improved method for identifying functionally linked proteins using phylogenetic profiles
Background: Phylogenetic profiles record the occurrence of homologs of genes across fully sequenced organisms. Proteins with similar profiles are typically components of protein c...
Shawn Cokus, Sayaka Mizutani, Matteo Pellegrini
121
Voted
CONSTRAINTS
1998
127views more  CONSTRAINTS 1998»
14 years 10 months ago
Experimental Analysis of Numeric and Symbolic Constraint Satisfaction Techniques for Temporal Reasoning
Many temporal applications like planning and scheduling can be viewed as special cases of the numeric and symbolic temporal constraint satisfaction problem. Thus we have developed ...
Malek Mouhoub, François Charpillet, Jean Pa...