Sciweavers

16513 search results - page 2976 / 3303
» Numerical Analysis Methods
Sort
View
MOBIMEDIA
2007
15 years 6 months ago
Performance evaluation of IEEE 802.11e based on ON-OFF traffic model
We investigate the performance of the IEEE 802.11e while emphasizing on the end-to-end delay performance. In our MAC delay analysis, we are based on elementary conditional probabi...
Ioannis Papapanagiotou, John S. Vardakas, Georgios...
SIMUTOOLS
2008
15 years 6 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
SDM
2007
SIAM
162views Data Mining» more  SDM 2007»
15 years 6 months ago
Probabilistic Joint Feature Selection for Multi-task Learning
We study the joint feature selection problem when learning multiple related classification or regression tasks. By imposing an automatic relevance determination prior on the hypo...
Tao Xiong, Jinbo Bi, R. Bharat Rao, Vladimir Cherk...
SDM
2007
SIAM
149views Data Mining» more  SDM 2007»
15 years 6 months ago
WAT: Finding Top-K Discords in Time Series Database
Finding discords in time series database is an important problem in a great variety of applications, such as space shuttle telemetry, mechanical industry, biomedicine, and financ...
Yingyi Bu, Oscar Tat-Wing Leung, Ada Wai-Chee Fu, ...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 6 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
« Prev « First page 2976 / 3303 Last » Next »