Sciweavers

2924 search results - page 556 / 585
» On the Use of Evidence in Neural Networks
Sort
View
ICIC
2009
Springer
14 years 11 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
SLIP
2003
ACM
15 years 6 months ago
Perimeter-degree: a priori metric for directly measuring and homogenizing interconnection complexity in multilevel placement
In this paper, we describe an accurate metric (perimeter-degree) for measuring interconnection complexity and effective use of it for controlling congestion in a multilevel framew...
Navaratnasothie Selvakkumaran, Phiroze N. Parakh, ...
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 4 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
EVOW
2007
Springer
15 years 5 months ago
Evaluation of Different Metaheuristics Solving the RND Problem
RND (Radio Network Design) is a Telecommunication problem consisting in covering a certain geographical area by using the smallest number of radio antennas achieving the biggest co...
Miguel A. Vega-Rodríguez, Juan Antonio G&oa...
CODASPY
2011
14 years 5 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong