Sciweavers

1693 search results - page 282 / 339
» Pattern-Recognition: a Foundational Approach
Sort
View
FUIN
2006
160views more  FUIN 2006»
15 years 4 months ago
Behavioral Pattern Identification Through Rough Set Modeling
This paper introduces an approach to behavioral pattern identification as a part of a study of temporal patterns in complex dynamical systems. Rough set theory introduced by Zdzisl...
Jan G. Bazan
IJCSS
2006
110views more  IJCSS 2006»
15 years 4 months ago
Business Engineering with Mobile Workforce Solutions
An analysis framework is presented that can be used to assess important issues of mobile workforce solutions, based on recent literature on mobile business. Within this framework ...
Yan Wang, Elisabeth van de Kar, Geleyn R. Meijer, ...
JAR
2008
81views more  JAR 2008»
15 years 4 months ago
Algorithms for Computing Minimal Unsatisfiable Subsets of Constraints
Much research in the area of constraint processing has recently been focused on extracting small unsatisfiable "cores" from unsatisfiable constraint systems with the goal...
Mark H. Liffiton, Karem A. Sakallah
IJSN
2006
140views more  IJSN 2006»
15 years 4 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
IJWIN
2006
119views more  IJWIN 2006»
15 years 4 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...