Sciweavers

5799 search results - page 916 / 1160
» Position Paper
Sort
View
ISCI
2008
181views more  ISCI 2008»
15 years 4 months ago
Attribute reduction in decision-theoretic rough set models
Rough set theory can be applied to rule induction. There are two different types of classification rules, positive and boundary rules, leading to different decisions and consequen...
Yiyu Yao, Yan Zhao
IJCV
2006
117views more  IJCV 2006»
15 years 4 months ago
Programmable Imaging: Towards a Flexible Camera
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric an...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
IJDSN
2006
136views more  IJDSN 2006»
15 years 4 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IJNSEC
2006
77views more  IJNSEC 2006»
15 years 4 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
COR
2007
80views more  COR 2007»
15 years 4 months ago
A MAX-MIN ant system for unconstrained multi-level lot-sizing problems
In this paper we present an ant-based algorithm for solving unconstrained multi-level lot-sizing problems called ant system for multi-level lot-sizing algorithm (ASMLLS). We apply...
Rapeepan Pitakaso, Christian Almeder, Karl F. Doer...