Sciweavers

2176 search results - page 178 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
143
Voted
COMCOM
2007
139views more  COMCOM 2007»
15 years 3 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
148
Voted
KDD
2006
ACM
200views Data Mining» more  KDD 2006»
16 years 4 months ago
A Random-Walk Based Scoring Algorithm Applied to Recommender Engines
Recommender systems are an emerging technology that helps consumers find interesting products and useful resources. A recommender system makes personalized product suggestions by e...
Augusto Pucci, Marco Gori, Marco Maggini
131
Voted
CDC
2008
IEEE
15 years 10 months ago
Shannon meets Bellman: Feature based Markovian models for detection and optimization
— The goal of this paper is to develop modeling techniques for complex systems for the purposes of control, estimation, and inference: (i) A new class of Hidden Markov Models is ...
Sean P. Meyn, George Mathew
133
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 9 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
123
Voted
ICAIL
2003
ACM
15 years 8 months ago
Logic-Based Regulation Compliance-Assistance
This paper focuses on the creation of a first order predicate calculus based regulation compliance-assistance system built upon an XML framework. Two areas of research that suppor...
Shawn Kerrigan, Kincho H. Law